Understanding and Deploying LDAP Directory Services, Second Edition [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Understanding and Deploying LDAP Directory Services, Second Edition [Electronic resources] - نسخه متنی

Timothy A. Howes, Mark C. Smith, and Gordon S. Good

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید






Privacy and Security Design Checklist


To review, here are the important points to consider when you're designing for privacy and security:


  • Understand the information in your directory, how it needs to be protected, and from whom it needs to be protected.


  • Think about who might want to compromise the security of your directory and their motives for doing so.


  • Understand the ways in which the security of your directory can be compromised.


  • Familiarize yourself with the various tools and techniques you can use to secure your directory.


  • Understand the sensitivity of the data stored in your directory.


  • If replication or synchronization is used, understand the places to which directory content is being replicated or synchronized.


  • Understand the network environment and the capabilities it might offer a hostile person.


  • Consider the physical security of the directory servers and backups of the directory data.


  • Be aware of any company policies and legal requirements that may apply to you.


  • When designing your directory, strike a balance between security requirements and usability.




/ 241