We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byNigel Haslip
Modified about 1 year ago
Our z/OS Security Introducing z/OS Security 1 hour PowerPointOur z/OS Security PowerPoint Our z/OS Security Administration and Auditing Webinar Understanding z/OS Security and Your Role = Datatrain Course Modules Mainframe Security Basics z/OS Security Administration z/OS Security Auditing and Recording z/OS Authorized Program Facility 1 hour Company name
Our Mainframe Systems 2Copyright © Interskill Learning 2012 Houston 1 Production z/OS 1 Development z/OS 10 z/Linux 1 z/VM Denver 1 Production z/OS 1 Development z/OS 1 Test z/OS
Our Physical Security 3Copyright © Interskill Learning 2012 Tape Drives Disk Systems HMC Badge Access UPS and Generator Safe from Storms and Earthquakes 24/7 Security Computer Room
Our Logon IDs 4Copyright © Interskill Learning 2012 Same as Windows Always 7 Characters Every z/OS user has an individual logon Separate power logon for administration staff. I T S Y S D S. Group Department Unique ID
Our Passwords 5Copyright © Interskill Learning 2012 Same as Windows 6-8 characters Must include 2 digits or special characters $) Cannot include logon ID Must be changed every 30 days Cannot use the same password Synchronized on every computer system.
z/OS Our External Security Manager Logon: IMS CICS TSO ASG TMON Tivoli Netview Tubes Telnet FTP USS NFS CA-7 IBM RACF 6Copyright © Interskill Learning 2012 Databases: DB2 IMS Transactions: IMS CICS WebSphere Application Server Statements Application: Logon Access LDAP
Our ESM Setup 7Copyright © Interskill Learning 2012 z/OS Production Denver Houston Coupling Facility z/OS Development z/OS Test z/OS Production z/OS Development z/VM z/Linux RACF Database
Our Network Security: Mainframe to Mainframe 8Copyright © Interskill Learning 2012 z/OS Production DenverHouston Coupling Facility z/OS Development z/OS Test z/OS Production z/OS Development z/VM z/Linux
Our Network Security: External 9Copyright © Interskill Learning 2012 z/OS Denver/Houston Customer A Customer B Network Switch VPN / SSL Bank A Printer A z/OS z/VM z/Linux
Our Tape Security 10Copyright © Interskill Learning 2012 Denver and Houston Automated Tape Library and Tapes Separate Tapes to send to external organizations Backup tapes in offsite storage Computer Room
Summary Our Mainframe Systems Our Physical Security Our Logon IDs Our Passwords Our External Security Manager Our Network Security Our Tape Security 11Copyright © Interskill Learning 2012 Introducing z/OS Security 1 hour PowerPointOur z/OS Security PowerPoint Our z/OS Security Administration and Auditing Webinar Understanding z/OS Security and Your Role = Datatrain Course Modules Mainframe Security Basics z/OS Security Administration z/OS Security Auditing and Recording z/OS Authorized Program Facility 1 hour
© 2006 IBM Corporation Introduction to z/OS Security Lesson 4: There’s more to it than RACF.
Introduction to z/OS Basics © 2006 IBM Corporation Chapter 3: z/OS Overview.
Copyright 2002, Computer Associates International, Inc CA Products for z/VM – Old Dogs with New Tricks Yvonne DeMeritt Sr. Sustaining Engineer CA.
PCTI Limited - A Unique Name For Quality Education CS-75 INTRANET ADMINISTRATION By: Vinay Aggarwal.
1 Capability Set - Detail. 2 Common Content Problems Content Mayhem –File management and storage confusion Content Multiplication –Editing déjà vu - same.
IBM Software Group Tivoli Software from IBM Storage Data Protection Solution Seminar Tele-Rep Training Manual Internal Document Prepared by: Wunderman.
Chapter 9 Computer Applications and Skills 1 Section 9.1 Computers in Marketing Marketing Essentials.
1 Capability Set - Detail. 2 Bb Academic Suite Capability Set by : System.
COPYRIGHT ANSWERS - for the information professional - Special Library Association Denver, June 6, 2007 Lesley Ellen Harris
MQ Series Cross Platform Dominant Messaging sw – 70% of market Messaging API same on all platforms Guaranteed one-time delivery Two-Phase Commit Wide EAI.
IBM Fundamentals of Applying Tivoli Storage Solutions V2 Visit:
Jazz Team Server Setup 1 Configure Database2 Enable Notifications3 Setup Users4 Summary Setup Users Jazz Team Server relies on a user registry to.
© 2006 IBM Corporation IBM System z Oracle/DB migration at the Québec Government Presented by: Karen Ann Plourde David Kreuter Enterprise Connections Webcast.
Database Management. Module 6 Objectives Next Discuss the functions common to most DBMSs Identify the qualities of valuable information Explain why data.
Organisational Information Systems Centralised Database.
Introduction to Student Plans and Special Education Beth Nordheim-Baker Student Plans User Support.
GCSE ICT Networks & Security.. Transferring data Most commercial computer users need to allow their employees to share data. It also needs more than one.
IT Security Auditing. Topics Defining IT Audit Risk Analysis Internal Controls Steps of an IT Audit Preparing to be Audited Auditing IT Applications Who.
EndNote Web Reference Management Software (module 5)
Managed virtual smart cardsUnmanaged virtual smart cards Inventory management PIN reset and unblock PIN change Policy enforcement Certificate.
Sentry Isis. Temporary Card Kiosk The system consists of a PC based kiosk running a windows application and a web application. Both applications interact.
® IBM Software Group © 2008 IBM Corporation A new feature providing mainframe development flexibility David Myers Rational Developer for System z Product.
Windows Server 2012: New Features. Administering Servers with Server Manager Using Server Manager, you can: Manage multiple servers from one instance.
Take the ‘dread’ out of your XA Security Audit Belinda Daub, Senior Consultant Technical Services
S pectrum Group KeyNET TM Advanced Key Management Software Simply … the FINEST Available ! PRESENTS KeyNET.
Windows 2008 Active Directory Configuration – Week 4 of 6 Microsoft Test: Mark McCoy MCSE, CNE, CISSP.
Learning Objectives 13.1 Explain how businesses benefit from the use of information technology (IT) Describe the components that enable IT– networks,
Enhanced Security Management, Separation of Duties and Audit Support for XA Belinda Daub, Senior Consultant Technical Services
© 2016 SlidePlayer.com Inc. All rights reserved.