User guide
1-1
Chapter 1
Security Risks
This chapter explains the resources to be protected (protection target resources), possible threats to the
protection target resources, and measures to be taken against the individual threats. The chapter uses
representative operation models of the Interstage Application Server to explain these.