Security Requirements and Exposure

What are we really concerned about when we talk about security? Independent of any technology, including computers, almost everyone agrees that there are certain common security requirements. However, they may not agree on what the specific requirements are. For some guidance about specific requirements we can look to the Information Security Technology Evaluation Criteria recommendation [ITSEC 1991]. It breaks security down into three broad requirements.

  1. Confidentiality: Certain types of information must be restricted to only those people who need to know it. Cryptology and encryption first come to mind for most people when they think about computer security.

  2. Integrity: Resources must be secure from malicious ...

Get Using XML with Legacy Business Applications now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.