Red Hat NETSCAPE ENTERPRISE SERVER 6.0 - PROGRAMMER GUIDE TO SERVLETS Guide de l'utilisateur Page 61

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 328
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 60
Multi Server Management
1-39
Threat Prevention
The following table lists countermeasures that can be taken against possible security risks.
Table 1-14 Threat Countermeasures
Possible threat Countermeasures
Decryption of user IDs and passwords
- User ID and password protection
Exploitation of user IDs and passwords
- Setting an expiration date for the user ID and
password
Tampering of data recorded in the file
- Setting access permissions for the file storing the
information
- Periodic data backup
Exploitation of information recorded in files
- Setting access permissions for the file storing the
information
Countermeasures Against Decryption of User IDs and Passwords
In an environment open to the public like the Internet, user IDs or passwords may be decrypted on their
transmission route. The Interstage Management Console and Interstage Operation Tool implement
encryption of user IDs and passwords, but it is still possible for them to be decrypted. To minimize this
risk, set expiration dates for user IDs and passwords and change them periodically.
Countermeasures Against Exploitation of User IDs and Passwords
In an environment open to limited users like an intranet, it is not likely that user IDs and passwords will
be decrypted. Such an environment is often the management base of user ID and password
information, and user ID and password information is often saved in a file. If this file is accessible by
unauthorized users, there is a high risk of exploitation of user ID and password information. An effective
countermeasure against this threat is to set appropriate access permissions for files, storing user ID and
password information.
Countermeasures Against Tampering of Data Recorded In Files
To use the Interstage Management Console and Interstage Operation Tool, the Interstage HTTP Server
environment definition file is required. If the information in this file is tampered with, it may disable the
Interstage Management Console and Interstage Operation Tool and cause various problems. An
effective countermeasure against this threat is to set appropriate access permissions for this file. For
Solaris OE or Linux systems, refer to Enhancing Security (Protecting Interstage Resources) in Appendix
A.
Periodic backups are also effective. For backup information, refer to Maintenance (Resource Backup)
in the Interstage Operator's Guide.
Vue de la page 60
1 2 ... 56 57 58 59 60 61 62 63 64 65 66 ... 327 328

Commentaires sur ces manuels

Pas de commentaire