Skip to main content

Introduction to the New Mainframe: Security

An IBM Redbooks publication

Note: This is publication is now archived. For reference only.

thumbnail 

Published on 03 April 2007, updated 26 April 2007

  1. .EPUB (4.1 MB)
  2. .PDF (5.5 MB)

Google Play Books

Share this page:   

ISBN-10: 0738489646
ISBN-13: 9780738489643
IBM Form #: SG24-6776-00


Authors: Rica Weller, Ross Clements, Ken Dugdale, Per Fremstad, Olegario Hernandez, William C. Johnston, Patrick Kappeler, Linda Kochersberger, Abey Tedla, Jeff Thompson and Ashwin Venkatraman

    menu icon

    Abstract

    This book provides students of information systems with the background knowledge and skills necessary to begin using the basic security facilities of IBM System z. It enables a broad understanding of both the security principles and the hardware and software components needed to insure that the mainframe resources and environment are secure. It also explains how System z components interface with some non-System z components. A multi-user, multi-application, multi-task environment such as System z requires a different level of security than that typically encountered on a single-user platform. In addition, when a mainframe is connected in a network to other processors, a multi-layered approach to security is recommended. Students are assumed to have successfully completed introductory courses in computer system concepts. Although this course looks into all the operating systems on System z, the main focus is on IBM z/OS. Thus, it is strongly recommended that students have also completed an introductory course on z/OS.

    Others who will benefit from this course include experienced data processing professionals who have worked with non-mainframe-based platforms, as well as those who are familiar with some aspects of the mainframe environment or applications but want to learn more about the security and integrity facilities and advantages offered by the mainframe environment.

    Table of Contents

    Part 1. Overview of security fundamentals

    Chapter 1. Why do we need security and why use a mainframe?

    Chapter 2. The bookstore--a case study

    Chapter 3. Security Concepts

    Chapter 4. Elements of security

    Part 2. Hardware and Networking security

    Chapter 5. System z architecture and security

    Chapter 6. System z virtualization and its challenges

    Chapter 7. Cryptography on System z

    Chapter 8. Network Security for System z

    Part 3. Securing operating systems on System z

    Chapter 9. z/OS System Integrity

    Chapter 10. z/OS System Authorization Facility and Security Managers

    Chapter 11. Security in z/OS UNIX

    Chapter 12. z/OS Communications Security

    Chapter 13. Security in z/VM

    Chapter 14. Security in Linux on System z

    Chapter 15. Security in z/VSE

    Chapter 16. Security in z/TPF

    Part 4. Security in Middleware and Applications

    Chapter 17. Data Management Security

    Chapter 18. Transaction security

    Chapter 19. Web-based security

    Chapter 20. Security for Identity Management

    Part 5. Information Security Program and Compliance

    Chapter 21. Creating an Information Security Program

    Chapter 22. Compliance and Certification

    Chapter 23. Operational Information Security Policy and Management

    Chapter 24. Security Audits

    Appendix A. Security Integrity Models

    Appendix B. z/OS UNIX General Resource Classes

    Appendix C. The Mainframe Charter

     

    Others who read this also read