About security for TCP/IP clients

TCP/IP connections between clients and servers — especially when they use the internet — are vulnerable to attack by malicious parties.

An attacker might attempt to:
  • Read confidential information flowing between client and server.

    You can protect your system by encrypting data that flows between the client and server.

  • Falsify information flowing between client and server.

    You can protect your system by encrypting data that flows between the client and server, and by detecting data that has been tampered with.

  • Impersonate a legitimate user of a client system.

    You can protect your system by authenticating users.

CICS® supports several schemes for authenticating users. See Identification and authentication for more information.

CICS can use the Secure Sockets Layer (SSL) security protocol or the Transport Layer Security (TLS) protocol to support secure TCP/IP connections. See Support for security protocols for more information.