User guide
Chapter 1: Security Risks
1-16
Countermeasures Against Threats
For the database linkage service, the following are effective measures against security invasion.
• Operation confined to specified users
• Periodic backup
• Use of the security function provided by the resource
Operations Confined to Specific Users
Operations confined to specific users can be effectively secured against the following threats:
• Tampering of information
• Exploitation of information
• Damage to data
• Damage to file
• Exploitation of passwords
Operations confined to specific users can be effectively secured by the following three procedures:
• Restraint on Services
• Construction of Environment by Specific Users
• Changing Access Permissions of Protected Resources
Restraint on Services
By restricting remotely accessible services (such as telnet and ftp) on nodes where Interstage is
operating, you can prevent unauthorized accesses. This measure is effective against unauthorized
accesses made through networks.
For details about how to restrict remotely accessible services, refer to the manual for each platform.
Construction of Environment by Specific Users
By restricting the operation of the entire system to specific users, you can prevent tampering of
information. For the database linkage service, specific users shall be selected as described below for
each platform.
Administrator (Administrator user)
root (Superuser)