Security is in large part about risk management. Because it is impossible to defend against every potential threat, one of the first steps taken in any security design is to assess which attacks are most likely or most costly or both. On the basis of that threat assessment, a solution is designed to reduce to a manageable level, or optimally eliminate, the risk associated with those threats. Table 8.1 summarizes the security exposures associated with JMX. Table 8.1. JMX Security Exposures and Consequences
|