Technologies to Address Security Risks

Although there are many ways of breaking into computer infrastructures, numerous technologies can be employed to reduce the security risks. This section discusses some of them, and the next section discusses best practices.

Encryption

By its nature, TCP is not a secure protocol. In TCP, all information is delivered in clear text. Therefore, if someone can intercept TCP packets, she'll be able to read the information contained in them. When this information is public in nature, for example, catalog information at a department store, this is perfectly okay. However, to securely transmit private, sensitive information on the very public Internet, this information must be encrypted.

Encrypting information involves ...

Get BEA WebLogic Server™ 8.1 Unleashed now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.