[ Team LiB ] Previous Section Next Section

Summary

As depicted in this chapter, you can see that although the Internet offers significant advantages over alternatives methods when it comes to providing access to information and services, there are many issues that must be considered and dealt with. Security isn't a topic that should be taken likely. Letting anyone have access to a cash register in a retail business is asking for trouble. Similarly, not having a proper security policy in place both internally and in regard to your Internet landscape is something that will eventually come back to bite you.

The tools available to crackers today make it relatively easy to find weak links in your infrastructure and to maximize the exploitation of such. Luckily, the tools to fight these would-be attackers have become stronger as well. Unfortunately, these tools cannot research, purchase, install, and configure themselves. A companywide initiative must take place for these events to happen.

In the next chapter, we'll talk about specific security issues concerning WebLogic and Java. We'll see how WebLogic implements the J2EE specification for security and extends it with functionality to provide superior security services.

    [ Team LiB ] Previous Section Next Section