Abstract
Chapter 5 focuses its intent on getting you thinking about various information security topics and how they apply to enterprise applications. In this chapter, we discuss some of the basic concepts and principles associated with information security including confidentiality, integrity, and availability. Authentication, authorization, audit, and administration of access control are also discussed in detail. These four topics tie together to form the access control mechanisms used by most enterprise applications today. Finally, we talk about defense in depth and applying the appropriate level of security controls at each layer of the enterprise application. The best approach is to always secure an enterprise application in the most holistic manner possible through the implementation of appropriate controls at all levels, and this is a common thread throughout the chapter.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.