33 wherein each unit is given only the minimum rights to complete its tasks. |
33 wherein each unit is given only the minimum rights to complete its tasks. |
34 Controls can be imposed by <i>authenticating</i> and <i>authoring</i> all |
34 Controls can be imposed by <i>authenticating</i> and <i>authoring</i> all |
35 traffic between units, and by limiting access rights of unidentified parties. |
35 traffic between units, and by limiting access rights of unidentified parties. |
36 These techniques can be applied from a single software component to an entire |
36 These techniques can be applied from a single software component to an entire |
37 business system.</p> |
37 business system.</p> |
38 <p>From Symbian OS v9.1 onwards, <xref href="jar:GUID-35228542-8C95-4849-A73F-2B4F082F0C44.jar!/sdk/doc_source/guide/platsecsdk/index.html" format="application/java-archive">platform security</xref> implements |
38 <p>From Symbian OS v9.1 onwards, <xref href="GUID-4BFEDD79-9502-526A-BA7B-97550A6F0601.dita">platform |
39 control of events inside the operating system and creates borders for different |
39 security</xref> implements control of events inside the operating system and |
40 security areas (for example, by means of <xref href="GUID-ACDED56F-38FE-491D-B019-BE2C53A75D28.dita">data |
40 creates borders for different security areas (for example, by means of <xref href="GUID-ACDED56F-38FE-491D-B019-BE2C53A75D28.dita">data caging</xref> and server |
41 caging</xref> and server protection). Platform security also implements the |
41 protection). Platform security also implements the minimum rights principle.</p> |
42 minimum rights principle.</p> |
|
43 <p>Additionally, there are <xref href="GUID-9058F379-C495-4B22-B270-FF6A80E450B8.dita#GUID-9058F379-C495-4B22-B270-FF6A80E450B8/GUID-9058F379-C495-4B22-B270-FF6A80E450B9">third-party |
42 <p>Additionally, there are <xref href="GUID-9058F379-C495-4B22-B270-FF6A80E450B8.dita#GUID-9058F379-C495-4B22-B270-FF6A80E450B8/GUID-9058F379-C495-4B22-B270-FF6A80E450B9">third-party |
44 security applications</xref> such as <i>antivirus software</i>, <i>firewalls,</i> and <i>intrusion |
43 security applications</xref> such as <i>antivirus software</i>, <i>firewalls,</i> and <i>intrusion |
45 detection systems</i> that provide good protection against hostile attacks |
44 detection systems</i> that provide good protection against hostile attacks |
46 when combined with strict <i>policies</i>.</p> |
45 when combined with strict <i>policies</i>.</p> |
47 </section> |
46 </section> |