Fujitsu C120-H007-06EN Computer Drive User Manual


 
C120-H007-05EN 95
CHAPTER 8 Security Actions
1
With more sophisticated and extensive use of servers, concern over the security of
server systems has become increasingly important. In an online application, for
example, a disruption of the central system would degrade or shut down the
functionality of the terminals, which could have social or economic consequences
depending on the nature of the application. Alteration, loss, or theft of data can be
considered an infringement on a person's property or privacy.
Thus, the security of a server system is of foremost importance and a security system
should be implemented to match the users' requirements based on their objectives for
using the server system, and other relevant characteristics including the economic and
social status of the users. This chapter describes the basic concepts involved in
security system.
8.1 Basic Concepts
This section discusses levels of security, objects of security, and the kinds of problems
that can be anticipated.
8.1.1 Levels of security
The implementation of security begins by deciding on the level of security required,
or to what extent security must be ensured. This is usually done by examining a
number of security levels and choosing one as the most appropriate. The security
level should be tailored to suit the users' particular needs. A general example of
security levels is given below:
1 Even if a disaster occurs, services can successfully continue.
The highest level of security which requires extensive technical and economic
discussions.