4 An Introduction to Security in a CSM 1.3 for AIX 5L Environment
Figure 1-2 Network firewall security
1.1.3 Data transmission security
Even when the internal network and the systems are secure, there is still the
concern for data transmitted over the network. You can have your data go to the
right place, but there could be eavesdropping (or listening) on the wire, and the
data transmitted could be copied.
To prevent eavesdropping, the data should be encrypted so that no one can
understand the data even if someone is listening. See 2.3, Security
requirements and algorithm relationship on page 18, for a more detailed
description of encryption methods.
It is important for confidential information, and particularly for financial
transactions, to keep the data private. Data security is especially important when
you are communicating over the public Internet. See Figure 1-3 on page 5.
Internet
Company
intranet
Firewall:
to protect
from "fire"
of Internet
Firewall "systems" can be
very elaborate - more
than one machine shown
Possible hacker

Get An Introduction to Security in a CSM 1.3 for AIX 5L Environment now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.