User guide

Chapter 1: Security Risks
1-16
Countermeasures Against Threats
For the database linkage service, the following are effective measures against security invasion.
Operation confined to specified users
Periodic backup
Use of the security function provided by the resource
Operations Confined to Specific Users
Operations confined to specific users can be effectively secured against the following threats:
Tampering of information
Exploitation of information
Damage to data
Damage to file
Exploitation of passwords
Operations confined to specific users can be effectively secured by the following three procedures:
Restraint on Services
Construction of Environment by Specific Users
Changing Access Permissions of Protected Resources
Restraint on Services
By restricting remotely accessible services (such as telnet and ftp) on nodes where Interstage is
operating, you can prevent unauthorized accesses. This measure is effective against unauthorized
accesses made through networks.
For details about how to restrict remotely accessible services, refer to the manual for each platform.
Construction of Environment by Specific Users
By restricting the operation of the entire system to specific users, you can prevent tampering of
information. For the database linkage service, specific users shall be selected as described below for
each platform.
Administrator (Administrator user)
root (Superuser)