ibm-information-center/dist/eclipse/plugins/i5OS.ic.rzaj4_5.4.0.1/rzaj45zrscenario1risks.htm

74 lines
5.3 KiB
HTML

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en-us" xml:lang="en-us">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="security" content="public" />
<meta name="Robots" content="index,follow" />
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
<meta name="DC.Type" content="concept" />
<meta name="DC.Title" content="Application security options" />
<meta name="abstract" content="Use this information to learn about common Internet security risks for a number of popular Internet applications and services and measures that you can take to manage these risks." />
<meta name="description" content="Use this information to learn about common Internet security risks for a number of popular Internet applications and services and measures that you can take to manage these risks." />
<meta name="DC.Relation" scheme="URI" content="rzaj4secoverview.htm" />
<meta name="DC.Relation" scheme="URI" content="rzaj45bchttpsec.htm" />
<meta name="DC.Relation" scheme="URI" content="rzaj45bejavasecurity.htm" />
<meta name="DC.Relation" scheme="URI" content="rzaj45zoemail.htm" />
<meta name="DC.Relation" scheme="URI" content="rzaj45zpftpsolutions.htm" />
<meta name="DC.Relation" scheme="URI" content="rzaj40a0internetsecurity.htm" />
<meta name="copyright" content="(C) Copyright IBM Corporation 1999, 2006" />
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 1999, 2006" />
<meta name="DC.Format" content="XHTML" />
<meta name="DC.Identifier" content="rzaj45zrscenario1risks" />
<meta name="DC.Language" content="en-us" />
<!-- All rights reserved. Licensed Materials Property of IBM -->
<!-- US Government Users Restricted Rights -->
<!-- Use, duplication or disclosure restricted by -->
<!-- GSA ADP Schedule Contract with IBM Corp. -->
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
<link rel="stylesheet" type="text/css" href="./ic.css" />
<title>Application security options</title>
</head>
<body id="rzaj45zrscenario1risks"><a name="rzaj45zrscenario1risks"><!-- --></a>
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
<h1 class="topictitle1">Application security options</h1>
<div><p><span>Use this information to learn about
common Internet security risks for a number of popular Internet applications
and services and measures that you can take to manage these risks.</span></p>
<p><img src="./delta.gif" alt="Start of change" />Application level security measures control how
users can interact with specific applications. In general, you should configure
security settings for each application that you use. However, you should take
special care to set up security for those applications and services that you
will be using from, or providing to, the Internet. These applications and
services are vulnerable to misuse by unauthorized users looking for a way
to gain access to your network systems. The security measures that you use
need to include both server-side and client-side security exposures.<img src="./deltaend.gif" alt="End of change" /></p>
<p><img src="./delta.gif" alt="Start of change" />While it is important to secure each application that you
use, the security measures play a small part in your overall security policy
implementation.<img src="./deltaend.gif" alt="End of change" /></p>
<p>To learn more about what you should do to secure several common Internet
applications, review these pages:</p>
</div>
<div>
<ul class="ullinks">
<li class="ulchildlink"><strong><a href="rzaj45bchttpsec.htm">Web serving security</a></strong><br />
When you provide access for visitors to your web site, you do not want to expose your viewers to information about how the site is set up and the coding that is used to generate the page.</li>
<li class="ulchildlink"><strong><a href="rzaj45bejavasecurity.htm">Java Internet security</a></strong><br />
Java™ programming is becoming increasingly widespread
in today's computing environments.</li>
<li class="ulchildlink"><strong><a href="rzaj45zoemail.htm">E-mail security</a></strong><br />
Using e-mail across the Internet or other untrusted network imposes security risks against which using a firewall may not protect.</li>
<li class="ulchildlink"><strong><a href="rzaj45zpftpsolutions.htm">FTP security</a></strong><br />
FTP (File Transfer Protocol) provides the capability of transferring files between a client (a user on another system) and your server.</li>
</ul>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzaj4secoverview.htm" title="Accessing the Internet from your LAN is a major step in the evolution of your network that will require you to reassess your security requirements.">iSeries and Internet security</a></div>
</div>
<div class="relconcepts"><strong>Related concepts</strong><br />
<div><a href="rzaj40a0internetsecurity.htm" title="Your security policy defines what you want to protect and what you expect of your system users.">The layered defense approach to security</a></div>
</div>
</div>
</body>
</html>