User guide

Chapter 1: Security Risks
1-8
Resource to be protected Possible threat
IJServer log file Tampering of data recorded in the file
Exploitation of information recorded in files
Damage to files
Log file for JServlet environment Tampering of data recorded in the file
Exploitation of information recorded in files
Damage to files
Log file for EJB environment Tampering of data recorded in the file
Exploitation of information recorded in files
Damage to files
Log in the database Tampering of data recorded
Exploitation of information recorded
Damage to data
Data in the database Tampering of data recorded
Exploitation of information recorded
Damage to data
Definition file for the Interstage HTTP
Server
Tampering of data recorded in the file
Exploitation of information recorded in files
Damage to files
Definition file for the InfoProvider Pro Tampering of data recorded in the file
Exploitation of information recorded in files
Damage to files
IJServer environment definition file Tampering of data recorded in the file
Exploitation of information recorded in files
Damage to files
Definition file for Servlet execution
environment
Tampering of data recorded in the file
Exploitation of information recorded in files
Damage to files
Definition file for EJB execution
environment
Tampering of data recorded in the file
Exploitation of information recorded in files
Damage to files
ear, war, jar, and rar deployment files Damage to files