Why are security infrastructure mismatches one of the most serious issues in software security?
What will be an ideal response?
One of the most serious issues in software security is the mismatch of the existing security infrastructure. Software systems built today are usually deployed on top of infrastructure components such as Microsoft Windows, UNIX, mainframe, midrange systems (AS/400), CORBA, and J2EE. Each infrastructure component has its own ways of handling security issues such as authentication and authorization. For example, UNIX uses a user password, J2EE uses Java authentication and authorization services (JAAS), and CORBA uses Kerberos. Users demand single sign on (SSO) where one authentication would provide access to all supporting platforms. Developing unified wrapper security policies and enforcement mechanisms for all existing infrastructure components is a problem that will require much research.
You might also like to view...
Java's predefined classes are grouped into
a. packets. b. declarations. c. Galleries. d. packages.
________ queries contain two or more tables and allow users to take advantage of relationships that have been set between these tables
Fill in the blank(s) with correct word
Name the two topologies that are most often used in wireless networks.
What will be an ideal response?
This is the "show me the endpoint" command.
A. RSH B. RCP C. netstat D. rlogin