2.3. Security in use

Since security is a complex and diversified topic, it is important to keep it simple.

The following list will show the basic security areas. These areas have to be taken into account and their requirements must always be fulfilled.

  • Authentication/Identification - Measures designed to protect against fraudulent transmission and imitative communications by establishing the validity of transmission, message, station or individual.

  • Access Control - The prevention of improper use of a resource, including the use of a resource in an unauthorized manner.

  • Privacy/Confidentiality - Assurance that information is not made available or disclosed to unauthorized individuals, entities, or processes.

  • Integrity - The correctness of information, ...

Get IBM WebSphere V5.0 Security: WebSphere Handbook Series now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.