Chapter 12
This chapter examines security from a broad perspective and highlights the key elements that you should consider when securing a Microsoft Application Center 2000 (Application Center) cluster and its applications. The chapter is organized so that you can skip the sections that you're already familiar with and go directly to the sections that you're interested in, such as "Platform Security" or "Application Center Security."
In This Chapter
Security: Trends and Perspectives
The Nature of Security Breaches
The Security Design Process
The Three-Tier Security Model
Platform Security
Application Center Security
Secure Remote Administration
Monitoring and Auditing
Think Like a Hacker
Resources
You can view Application Center security as a pyramid. You have to secure the base—all the low-level services, such as the network and operating system—and then work up and secure the higher levels. For this reason, a significant portion of this chapter deals with the foundation of the pyramid.
Before getting into the specifics of security practices and technologies, let's look at some security trends and perspectives and see what the experts have to say about computer crime and security.