Can CICS Be Hacked? Are Yesterday's Practices Today's Exposure?
Project and Program:
Application Architecture Development and Integration,
CICS
Tags:
Proceedings,
SHARE in Orlando 2015,
2015
Once upon a time, it was easy to secure a CICS system. Users accessed CICS from terminals directly connected to the mainframe or on dedicated leased circuits. But consider today's CICS. Many users access CICS across the Internet. Yeah, the global backbone network now brings traffic to our CICS systems. Have you updated the security for your z/OS system and for CICS? This session will survey potential entry points for an unauthorized user and the security mechanisms to close that door. The speaker will also highlight security enhancements recently delivered for CICS.-Leigh Compton-IBM Corporation
Back to Proceedings File Library