Can CICS Be Hacked? Are Yesterday's Practices Today's Exposure?
Project and Program:
Application Architecture Development and Integration,
CICS
Tags:
Proceedings,
SHARE Atlanta 2016,
2016
Once upon a time, it was easy to secure a CICS system. Users accessed CICS from terminals directly connected to the mainframe or on dedicated leased circuits. But consider today's CICS. Many users access CICS across the Internet. Yeah, the global backbone network now brings traffic to our CICS systems. Have you updated the security for your z/OS system and for CICS? In this session, the speaker will survey potential entry points for an unauthorized user and the security mechanisms to close that door. The speaker will also highlight security enhancements recently delivered for CICS.-Ian Burnett-IBM UK Laboratories Limited
Back to Proceedings File Library