Providing insights to cyber security & resiliency on our platform
In my last blog post, I discussed how program checks can be used to detect security vulnerabilities on z/OS through program check analysis, an established method that IBM has been using ...
z/OS system integrity has been a fundamental principle of the z/OS operating system for over fifty years since the z/OS system integrity statement was first issued in 1973 and the definition ...
HACKERS or just Curious Users. We all know, they can be External or Internal ones. This blog is particularly more concern with Internal Hackers or at least those curious users that may ...
The UNIX superuser Introduction Attackers prefer to target highly privileged users. On a UNIX operating system, the preferred target is a superuser , often referred to as ...
z/OS UNIX System Services Users and Groups Introduction In my previous articles, I discussed file and file system security. We saw the concept of a user owner and a group ...
z/OS UNIX System Services File Security Introduction In my previous article “ UNIX File System Security ”, I discussed file system security, concentrating on security controls ...
z/OS UNIX System Services File System Security Introduction We in z/OS development often get questions like: “How do I secure UNIX System Services?” It’s a difficult ...