Planning Internet security

Use this information to gain a general understanding of the strengths of iSeries™ security for e-business and the iSeries security offerings available to you.

As you develop your Internet usage plans, you must carefully plan for your Internet security needs. You must gather detailed information about your Internet usage plans and document your internal network configuration. Based on the results of gathering this information, you can accurately evaluate your security needs.

For instance, you should document and describe such things as the following:

Documenting this type of information helps you determine where your security exposures are and what security measures you need to use to minimize these exposures.

Start of changeFor example, you decide that you want to allow your internal users to use Telnet to connect to hosts at a special research location. Your internal users need this service to help them develop new products for your company. However, you have some concerns about confidential data flowing unprotected across the Internet. If competitors capture and exploit this data, your company might face a financial risk. Having identified your usage needs (Telnet) and the associated risks (exposure of confidential information), you can determine what additional security measures you should put into effect to ensure data confidentiality for this usage (Secure Sockets Layer (SSL) enablement).End of change

As you develop your Internet usage and security plans, you may find it helpful to review these topics: