Symbian3/SDK/Source/GUID-CC8EA664-FF2E-40FB-BC1C-89FB1255A9C9.dita
changeset 2 ebc84c812384
parent 0 89d6a7a84779
equal deleted inserted replaced
1:25a17d01db0c 2:ebc84c812384
    33 wherein each unit is given only the minimum rights to complete its tasks.
    33 wherein each unit is given only the minimum rights to complete its tasks.
    34 Controls can be imposed by <i>authenticating</i> and <i>authoring</i> all
    34 Controls can be imposed by <i>authenticating</i> and <i>authoring</i> all
    35 traffic between units, and by limiting access rights of unidentified parties.
    35 traffic between units, and by limiting access rights of unidentified parties.
    36 These techniques can be applied from a single software component to an entire
    36 These techniques can be applied from a single software component to an entire
    37 business system.</p>
    37 business system.</p>
    38 <p>From Symbian OS v9.1 onwards, <xref href="jar:GUID-35228542-8C95-4849-A73F-2B4F082F0C44.jar!/sdk/doc_source/guide/platsecsdk/index.html" format="application/java-archive">platform security</xref> implements
    38 <p>From Symbian OS v9.1 onwards, <xref href="GUID-4BFEDD79-9502-526A-BA7B-97550A6F0601.dita">platform
    39 control of events inside the operating system and creates borders for different
    39 security</xref> implements control of events inside the operating system and
    40 security areas (for example, by means of <xref href="GUID-ACDED56F-38FE-491D-B019-BE2C53A75D28.dita">data
    40 creates borders for different security areas (for example, by means of <xref href="GUID-ACDED56F-38FE-491D-B019-BE2C53A75D28.dita">data caging</xref> and server
    41 caging</xref> and server protection). Platform security also implements the
    41 protection). Platform security also implements the minimum rights principle.</p>
    42 minimum rights principle.</p>
       
    43 <p>Additionally, there are <xref href="GUID-9058F379-C495-4B22-B270-FF6A80E450B8.dita#GUID-9058F379-C495-4B22-B270-FF6A80E450B8/GUID-9058F379-C495-4B22-B270-FF6A80E450B9">third-party
    42 <p>Additionally, there are <xref href="GUID-9058F379-C495-4B22-B270-FF6A80E450B8.dita#GUID-9058F379-C495-4B22-B270-FF6A80E450B8/GUID-9058F379-C495-4B22-B270-FF6A80E450B9">third-party
    44 security applications</xref> such as <i>antivirus software</i>, <i>firewalls,</i> and <i>intrusion
    43 security applications</xref> such as <i>antivirus software</i>, <i>firewalls,</i> and <i>intrusion
    45 detection systems</i> that provide good protection against hostile attacks
    44 detection systems</i> that provide good protection against hostile attacks
    46 when combined with strict <i>policies</i>.</p>
    45 when combined with strict <i>policies</i>.</p>
    47 </section>
    46 </section>