Summary

  

This chapter introduced the purpose of several of the Java components . It cannot be overemphasized that this chapter is just a starting point. Organizations and individuals can add protocols and algorithms to the Java SPI layer without changing the Java API and evolve the security for their organization.

The security operations and elements discussed are given as a minimum to understand how to secure one's systems. If the creation, management, and trusted storage of the security elements are not considered , the security is compromised. For instance, you may have an application that depends on a trusted digest and you may be keeping the trusted digest in a non-secure location; thus, a hacker can change the digest used to check data. Equal amounts of consideration and requirements need to be applied to the security elements as are applied to the security operation.

There is never a point when an organization is considered too secure, unless the organization is never accessed by anyone . When an attacker attacks, the organization needs a plan to apply resources, time, and tools to isolate an attacker and protect its systems. Time, money, and materials can be applied ahead of time to try to prevent attacks. I will offer one quote that fully describes security: "If you think security is expensive, try the cost of recovering from an attack."

  


Java Security Solutions
Java Security Solutions
ISBN: 0764549286
EAN: 2147483647
Year: 2001
Pages: 222

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net