skip book previous and next navigation links
go up to top of book: HP OpenVMS Guide to System Security HP OpenVMS Guide to System Security
go to beginning of part: Security for the System Administrator Security for the System Administrator
go to beginning of chapter: Security in a Network Environment Security in a Network Environment
 
go to next page: Hierarchy of Access ControlsHierarchy of Access Controls
end of book navigation links

Managing Network Security  



Networking software regulates access to the network on various levels:

Requirements for Achieving Security  

There are three critical requirements for achieving security in a network environment:

 

Figure 1  The Reference Monitor in a Network  
tbs

Auditing in the Network  

Security administrators can audit network activity by enabling specific event classes with the SET AUDIT command. Possible audits include:


 
go to next page: Hierarchy of Access ControlsHierarchy of Access Controls