User guide

Security System Guide - Table of Contents
ix
Setting Access Permission for Operating Resources.........................................................1-30
Protecting Communication Contents..................................................................................1-31
Confirming the Authentication Server.................................................................................1-31
Countermeasures Against Password Attacks.....................................................................1-31
Operating and Managing a Business Server......................................................................1-33
Application Programming ...................................................................................................1-33
Applying Patches................................................................................................................1-34
Messages Displayed on the Web Browser.........................................................................1-34
Multi Server Management.............................................................................................................1-35
Configuration Model.................................................................................................................1-36
Resources to be Protected ......................................................................................................1-38
Functions to be Protected...................................................................................................1-38
Resources to be Protected.................................................................................................1-38
Possible Security Risks to Resources.....................................................................................1-38
Threat Prevention ....................................................................................................................1-39
Countermeasures Against Decryption of User IDs and Passwords...................................1-39
Countermeasures Against Exploitation of User IDs and Passwords .................................1-39
Countermeasures Against Tampering of Data Recorded In Files ......................................1-39
Countermeasures Against Exploitation of Information Recorded in Files..........................1-40
Countermeasures Against Damage to Files.......................................................................1-40
Configuration Management Function............................................................................................1-41
Configuration Management Function Usage Model................................................................1-41
Resources to be Protected ......................................................................................................1-41
Functions to be Protected...................................................................................................1-41
Resources to be Protected.................................................................................................1-42
Possible Security Risks to Resources.....................................................................................1-42
Threat Prevention ....................................................................................................................1-42
Countermeasures Against Overwriting Information Recorded in Files ..............................1-43
Countermeasures Against Exploiting Information Recorded in Files .................................1-43
Countermeasures Against File Corruption .........................................................................1-43
Chapter 2 Security Measures
Common Security Measures ..........................................................................................................2-2
Notes on User Accounts ............................................................................................................2-2
Backup .......................................................................................................................................2-2
Notes on Interstage Installation Resources...............................................................................2-2
Security Measures for Interstage Operation Tool ...........................................................................2-3
Notes on User Accounts ............................................................................................................2-3
Notes on the Permissions of the Environment Definition File ...................................................2-3
Notes on Communication Data..................................................................................................2-3