z/OS Ethical Hacking (aka Penetration Testing)
Project and Program:
Enterprise Data Center,
Security and Compliance
Tags:
Proceedings ,
SHARE in Boston 2013 ,
2013
The speaker will reveal many common security System z security issues and how they can be exploited. Discover how our speakers have successfully exploited these security issues while performing penetration tests for many organizations globally. Our speakers will demonstrate how users acquire inappropriate privileges on a z/OS system. Issues covered include: • User IDs with default passwords
• UADS
• HMC Protection
• APF & Linklisted libraries that not correctly secured
• Anonymous FTP issues
Upon completion of this session, you will understand how to configure z/OS to better protect against unauthorized access to the system.
Why attend this workshop session? Because you need to know what the bad guys are thinking! Mark Wilson RSM Partners
Mark Wilson , RSM Partners
Back to Proceedings File Library