Escolar Documentos
Profissional Documentos
Cultura Documentos
relacionadas
causadas
por
vrus
que
so
ambientes distribudos.
Hardware de segurana habilitado oferece proteo inigualvel para o
isolamento da carga de trabalho,
proteo de armazenamento e comunicaes seguras. Built-in de segurana
integrado
todo o sistema operacional, infra-estrutura de rede, middleware, aplicativo
e arquiteturas de banco de dados oferecer infra-estruturas seguras e de
negcio seguro
processamento, o que promove o cumprimento. Executa criptografia do
mainframes
em vrias camadas da infra-estrutura, que garante a proteco de dados
em todo o seu ciclo de vida.
O IBM System z junta mainframes IBM anteriores como somente servidores
do mundo
com o mais alto nvel de certificao de segurana de hardware, ou seja,
Common Criteria
Evaluation Assurance Nvel 5 (EAL5). O ranking EAL5 d s empresas
confiana de que podem executar diversas aplicaes rodando em
diferentes
sistemas operacionais, tais como z / OS, z / VM, z / VSE , z / TPF e
baseada em Linux
As aplicaes que contenham dados confidenciais, tais como folha de
pagamento, recursos humanos,
sistemas de comrcio eletrnico, ERP e CRM, em um System z dividido em
parties
que manter os dados de cada aplicativo seguro e diferente dos outros.
Security on z/OS
_
_
_
_
_
Security administration
Data security is the protection of data from accidental or deliberate unauthorized
disclosure, modification, or destruction. Based on this definition, it is apparent
that all data-processing installations have at least potential security or control
problems. Users have found, from past experience, that data security measures
can have a significant impact on operations in terms of both administrative tasks
and demands made on the user.
RACF gives the user defined with the SPECIAL attribute (the security
administrator) many responsibilities both at the system level and at the group
level. The security administrator is the focal point for planning security in the
installation and needs to:
_ Determine which RACF functions to use.
_ Identify the level of RACF protection.
_ Identify which data RACF is to protect.
_ Identify administrative structures and users.
screening services that deny or grant access based on such things as user
name, host name, and TCP/IP protocol. A firewall can also provide a variety of
services that let authorized users through while keeping unauthorized users out,
and at the same time ensure that all communications between your network and
the Internet appear to end at the firewall, denying the outside world to see the
structure of your network.