+

Search Tips   |   Advanced Search

Hardening security configurations


There are several methods that we can use to protect the WAS infrastructure and applications from different forms of attack. Several different techniques can help with multiple forms of attack. Sometimes a single attack can leverage multiple forms of intrusion to achieve the end goal.

For example, in the simplest case, network sniffing can be used to obtain passwords and those passwords can then be used to mount an application-level attack.

The following issues are discussed in IBM WebSphere Developer Technical Journal: WAS V5 advanced security and system hardening:

 

 

Related tasks


Tuning, hardening, and maintaining security configurations