User guide
OLTP Function
1-21
Possible Threats to Resources
The following describes the possible security threats posed to resources to be protected in operation of
an OLTP application.
Table 1-10 Possible Security Threats
Resource to be protected Possible threat
User account used for authentication Decryption of passwords
Exploitation of passwords
Log file for CORBA service Tampering of data recorded in the file
Exploitation of information recorded in files
Damage to files
Implementation Repository file Tampering of data recorded in the file
Exploitation of information recorded in files
Damage to files
Output file for the CORBA WorkUnit Tampering of data recorded
Exploitation of information recorded
Damage to data
Error log file Tampering of data recorded in the file
Exploitation of information recorded in files
Damage to files
WorkUnit definition Tampering of data recorded in the file
Exploitation of information recorded in files
Damage to files
Output file for the transaction application Tampering of data recorded
Exploitation of information recorded
Damage to data
Data file for Naming Service Tampering of data recorded in the file
Exploitation of information recorded in files
Damage to files
Data file for Interface Repository Tampering of data recorded in the file
Exploitation of information recorded in files
Damage to files