4.2. Cryptography principles

On unsecured networks, such as TCP/IP, there is a concern for both the sender and the receiver about the security of the data that is sent over the network. The network protocol itself does not provide any protection against tampering with the data. Figure 4-1 illustrates an end-to-end model that is not secure. The enterprise data and applications are not guarded from external access via the connection provided by the Web server to the Internet. This exposure has threats of information theft, malicious destruction of business applications, or general access violations.

Figure 4-1. The basic “no-security” end-to-end model

When pushing the enterprise onto the Internet, four security issues need to be addressed: ...

Get IBM e-business Technology, Solution, and Design Overview now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.