User guide
OLTP Function
1-23
Countermeasures Against Tampering of Data Recorded in the File
There are environment definition files and other such files in the operating environment of an OLTP
application. If the information in this file is illicitly tampered with, it may disable an OLTP application and
cause various problems. An effective countermeasure against this threat is to set appropriate access
permissions on this file. For Solaris OE system or Linux system, refer to Enhancing Security (Protecting
Interstage Resources) in Appendix A.
Periodic backup is also effective. For the information about backup, refer to Maintenance (Resource
Backup) in the Interstage Operator's Guide.
Countermeasures Against Exploitation of Information Recorded in Files
There are files storing information necessary for the operation of an OLTP application. The contents of
these files are also a part of resources, and it is important to prevent exploitation of them. To minimize
the risk of exploitation of information, it is effective to set appropriate access permissions on these files.
For Solaris OE system or Linux system, refer to Enhancing Security (Protecting Interstage Resources)
in Appendix A.
Countermeasures Against Damage to Data
In the operating environment of an OLTP application, there are important files like the environment
definition file. If information in these files is illicitly tampered with, it may disable an OLTP application
and cause various problems. An effective countermeasure against this threat is to set appropriate
access permissions on these files. For Solaris OE system or Linux system, refer to Enhancing Security
(Protecting Interstage Resources) in Appendix A.
Periodic backup is also effective. For backup, refer to Maintenance (Resource Backup) in the Interstage
Operator's Guide.
Countermeasures Against Damage to Files
In the operating environment of an OLTP application, there are important files like the environment
definition file. If information in these files is illicitly tampered with, it may disable an OLTP application
and cause various problems. An effective countermeasure against this threat is to set appropriate
access permission on these files.
Operation must be done by authorized users (Administrator) having administrator privileges. Change
the permissions of the file to be accessible only to authorized users.
For the detailed procedure, refer to the manual of the OS.
Refer to Enhancing Security (Protecting Interstage Resources) in Appendix A, and take appropriate
actions.
Periodic backup is also effective. For backup, refer to Maintenance (Resource Backup) in the Interstage
Operator’s Guide.