z/OS JES2 Initialization and Tuning Guide
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


Security

z/OS JES2 Initialization and Tuning Guide
SA32-0991-00

(See Security considerations.)
  • How do you keep an unauthorized node from signing onto your node, or sending and receiving data both to and from your node?
  • How can you protect the data as it travels through the network?
  • Does the data require SSL/TLS encryption?
  • Is there agreement on the use of nodal passwords?
  • When and how will the passwords be changed?
  • What kind of protection will the passwords have?
  • What command authority should participating nodes have on the individual installations?
  • Should that authority be changed by operator commands?

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014