Summary

  

This chapter addressed the need to secure your enterprise data. There are basically two ways to accomplish this: Secure the connection and secure your data at the source. Depending on your needs, you can implement either or both of these methods .

Securing the connection involves ensuring that the data is not modified or compromised in transit. There are two mechanisms that you can use to connect to your database: JDBC and the Connector architecture. Actually, the mechanisms to secure the connection are the same: Let the container manage the connection or manage the connection at the application level. These connections can be established using SSL, and you have the option to use Kerberos-based authentication.

Securing your data at the source involves making sure that your database is secure against break-ins. You can accomplish this by encrypting your data at the database level - denying access to certain data by creating a read- or write-only database. In addition, setting and managing the permissions at the database system is an important security step to prevent your data from being compromised.

  


Java Security Solutions
Java Security Solutions
ISBN: 0764549286
EAN: 2147483647
Year: 2001
Pages: 222

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net