User guide
vii
Table of Contents
Chapter 1 Security Risks
Interstage Management Console and Interstage Operation Tool...................................................1-2
Resources to be Protected ........................................................................................................1-2
Functions to be Protected.....................................................................................................1-2
Resources to be Protected...................................................................................................1-2
Possible Security Risks to Resources.......................................................................................1-3
Countermeasures Against Threats ............................................................................................1-3
Countermeasures Against Decryption of User IDs and Passwords.....................................1-3
Countermeasures Against Exploitation of User IDs and Passwords ...................................1-4
Countermeasures Against Tampering of Data Recorded In Files ........................................1-4
Countermeasures Against Exploitation of Information Recorded in Files............................1-4
Countermeasures Against Damage to Files.........................................................................1-4
J2EE Application .............................................................................................................................1-5
Resources to be Protected ........................................................................................................1-5
Functions Used for Operation of J2EE Applications ............................................................1-5
Resources to be Protected...................................................................................................1-6
Possible Security Risks .............................................................................................................1-7
Possible Countermeasures .......................................................................................................1-9
Countermeasures Against Decryption of Passwords...........................................................1-9
Countermeasures Against Exploitation of Passwords..........................................................1-9
Countermeasures Against Tampering of Data Recorded in Files ........................................1-9
Countermeasures Against Exploitation of Information Recorded in Files............................1-9
Countermeasures Against Damage to Data.......................................................................1-10
Countermeasures Against Damage to Files.......................................................................1-10
Web Services................................................................................................................................1-11
Database Linkage Service............................................................................................................1-12
Resources to be Protected ......................................................................................................1-12
Functions to be Protected...................................................................................................1-12
Resources to be Protected.................................................................................................1-13
Possible Threats to Resources................................................................................................1-15
Countermeasures Against Threats ..........................................................................................1-16