skip book previous and next navigation links
go up to top of book: HP OpenVMS Guide to System Security HP OpenVMS Guide to System Security
go to beginning of part: Security Overview Security Overview
go to beginning of chapter: OpenVMS Security Model OpenVMS Security Model
go to previous page: Implementation of the Reference Monitor Implementation of the Reference Monitor
go to next page: Security for the UserSecurity for the User
end of book navigation links

Summary: System Security Design  



When designing an overall system security plan, ask yourself the following questions:

These considerations, as well as the underlying reference monitor design, apply equally to a timesharing system, a widespread network, or a single application on a system that grants access to records in a file or database. The operating system provides general mechanisms that users and security administrators must apply to achieve system security. See Managing the System and Its Data for more information on designing and implementing a security policy.


go to previous page: Implementation of the Reference Monitor Implementation of the Reference Monitor
go to next page: Security for the UserSecurity for the User