5.6. Protecting Systems

Cryptography provides an important set of capabilities in a distributed computing environment, but although it has a part to play, it does not provide a complete solution to the issues of protecting systems against abuse or attack. In principle, these issues are addressed by the notions of identification, authentication, authorization, and resource control that were discussed earlier. In practice, these issues are more complex than first described. The following sections examine some of the issues that surround protection of a distributed, Internet connected, computing system.

Physical Security and the Insider

Despite the obvious and newsworthy troubles caused by script-kiddies (usually youngsters experimenting with hacking ...

Get Sun Certified Enterprise Architect for J2EE™ Technology Study Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.