z/OS JES2 Initialization and Tuning Guide
Previous topic
|
Next topic
|
Contents
|
Contact z/OS
|
Library
|
PDF
Security
z/OS JES2 Initialization and Tuning Guide
SA32-0991-00
(See
Security considerations
.)
How do you keep an unauthorized node from signing onto your node, or sending and receiving data both to and from your node?
How can you protect the data as it travels through the network?
Does the data require SSL/TLS encryption?
Is there agreement on the use of nodal passwords?
When and how will the passwords be changed?
What kind of protection will the passwords have?
What command authority should participating nodes have on the individual installations?
Should that authority be changed by operator commands?
Parent topic:
General considerations
Copyright IBM Corporation 1990, 2014