Chapter 12 -- Security: For Administrators and Developers

Chapter 12

This chapter examines security from a broad perspective and highlights the key elements that you should consider when securing a Microsoft Application Center 2000 (Application Center) cluster and its applications. The chapter is organized so that you can skip the sections that you're already familiar with and go directly to the sections that you're interested in, such as "Platform Security" or "Application Center Security."

In This Chapter

Security: Trends and Perspectives

The Nature of Security Breaches

The Security Design Process

The Three-Tier Security Model

Platform Security

Application Center Security

Secure Remote Administration

Monitoring and Auditing

Think Like a Hacker

Resources

You can view Application Center security as a pyramid. You have to secure the base—all the low-level services, such as the network and operating system—and then work up and secure the higher levels. For this reason, a significant portion of this chapter deals with the foundation of the pyramid.

Before getting into the specifics of security practices and technologies, let's look at some security trends and perspectives and see what the experts have to say about computer crime and security.



Microsoft Application Center 2000 Resource Kit 2001
Microsoft Application Center 2000 Resource Kit 2001
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 183

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net