To get started with system security, you protect systems
and information through prevention, detection, and responses to improper
access from within and outside your organization.
Attention: Improper access can result in information
that is altered, destroyed, misappropriated, or can result in the
misuse of your systems to attack others. While no IT system or product
can be made completely secure, and no single product or security measure
can be completely effective in preventing improper access, a comprehensive
plan can improve your security. The security documentation for InfoSphere® MDM,
which is provided here, is only one piece of a full security plan.
You must also review your organization’s security policies, the other
applications’ security documentation, and other security reference
materials.
The following examples show some possible security threats to MDM
implementations and your enterprise:
- Denial-of-service attacks that cause outages for your master data
- Penetration of secure systems for unauthorized data access
- Social engineered attacks: lying, cheating, impersonation, intimidation
attacks
- Phishing for confidential information and Trojan applications
unauthorized access to protected data
- Web vulnerabilities for web-based and mobile applications
- Malicious code that is injected into your custom MDM applications
- Physical threats to infrastructure such as hardware, networks,
and buildings