Security

To get started with system security, you protect systems and information through prevention, detection, and responses to improper access from within and outside your organization.

Attention: Improper access can result in information that is altered, destroyed, misappropriated, or can result in the misuse of your systems to attack others. While no IT system or product can be made completely secure, and no single product or security measure can be completely effective in preventing improper access, a comprehensive plan can improve your security. The security documentation for InfoSphere® MDM, which is provided here, is only one piece of a full security plan. You must also review your organization’s security policies, the other applications’ security documentation, and other security reference materials.
The following examples show some possible security threats to MDM implementations and your enterprise:
  • Denial-of-service attacks that cause outages for your master data
  • Penetration of secure systems for unauthorized data access
  • Social engineered attacks: lying, cheating, impersonation, intimidation attacks
  • Phishing for confidential information and Trojan applications unauthorized access to protected data
  • Web vulnerabilities for web-based and mobile applications
  • Malicious code that is injected into your custom MDM applications
  • Physical threats to infrastructure such as hardware, networks, and buildings