Summary


Security has taken unprecedented importance in many industries today, and every organization must adopt proactive security measures for data, processes, and resources throughout the information life cycle. Thus, an organization must have a thorough understanding of the business challenges related to security, critical security threats, exploits, and how to mitigate risk and implement safeguards and countermeasures. Adopting security by using proactive approaches becomes essential to organizational health and well-being. Such approaches may well also increase operational efficiency and cost effectiveness.

In this chapter, we have had an overview of security strategies and key technologies as well as the importance of delivering end-to-end security to an IT system. In particular, we discussed the key constituents that contributes to achieving "Security-by-Default," such as:

  • Understanding the weakest links in an IT ecosystem

  • Understanding the boundaries of end-to-end security

  • Understanding the impact of application security

  • Strategies for building robust security architecture

  • Understanding the importance of security compliance

  • Understanding the importance of identity management

  • Understanding the importance of secure personal identification

  • Understanding the importance of Java technology

  • How to justify security as a business enabler

We've just looked at the importance of proactive security approaches and strategies. Now we'll start our detailed journey with a closer look at key security technologies. Then we'll look at how to achieve Security by Default by adopting radical approaches based on well-defined security design methodology, pattern catalogs, best practices, and reality checks.




Core Security Patterns. Best Practices and Strategies for J2EE, Web Services, and Identity Management
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
ISBN: 0131463071
EAN: 2147483647
Year: 2005
Pages: 204

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net