This chapter addressed the need to secure your enterprise data. There are basically two ways to accomplish this: Secure the connection and secure your data at the source. Depending on your needs, you can implement either or both of these methods . Securing the connection involves ensuring that the data is not modified or compromised in transit. There are two mechanisms that you can use to connect to your database: JDBC and the Connector architecture. Actually, the mechanisms to secure the connection are the same: Let the container manage the connection or manage the connection at the application level. These connections can be established using SSL, and you have the option to use Kerberos-based authentication. Securing your data at the source involves making sure that your database is secure against break-ins. You can accomplish this by encrypting your data at the database level - denying access to certain data by creating a read- or write-only database. In addition, setting and managing the permissions at the database system is an important security step to prevent your data from being compromised. Java Security Solutions ISBN: 0764549286
EAN: 2147483647 Year: 2001
Pages: 222 Authors: Rich Helton, Johennie Helton
flylib.com © 2008-2017. If you may any questions please contact us: flylib@qtcs.net |