Red Hat NETSCAPE ENTERPRISE SERVER 6.0 - PROGRAMMER GUIDE TO SERVLETS Guide de l'utilisateur Page 44

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 328
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 43
Chapter 1: Security Risks
1-22
Resource to be protected Possible threat
Naming Service for load balance Tampering of data recorded in the file
Exploitation of information recorded in files
Damage to files
Definitions related to Interstage Tampering of data recorded in the file
Exploitation of information recorded in files
Damage to files
WorkUnit definition Tampering of data recorded in the file
Exploitation of information recorded in files
Damage to files
Countermeasures Against Security Risks
The following describes possible countermeasures against security risks to the resources.
Table 1-11 Countermeasures
Possible threat Countermeasures
Decryption of Passwords Encryption of passwords
Exploitation of passwords Encryption of passwords
Periodic password change
Tampering of data recorded in the file Setting access permissions on the file storing the
information
Periodic data backup
Exploitation of information recorded in files Setting access permissions on the file storing the
information
Damage to data Periodic data backup
Damage to files Setting access permission to the file
Countermeasures Against Decryption of Passwords
In an environment open to the public like the Internet, passwords may be decrypted on their
transmission route. You can minimize this risk by encrypting passwords.
Countermeasures Against Exploitation of Passwords
In an environment open to the limited users like an intranet, it is not likely that passwords will be
decrypted. Such an environment may be the management base of the passwords, and the information
of passwords is often saved in a file. If this file is accessible by unauthorized users, there is a high risk
of exploitation of the password information saved in the file. An effective countermeasure against this
threat is to set appropriate access permissions on this type of file.
Vue de la page 43
1 2 ... 39 40 41 42 43 44 45 46 47 48 49 ... 327 328

Commentaires sur ces manuels

Pas de commentaire