Securing DB2 and implementing MLS on z/OS

Today's computing environment is subject to increasing regulatory pressures and potentially malicious attacks. Regulatory compliance, security, and audit are in the daily headlines and growing more prominent.The security of the information to which you have been entrusted has never been more cr...

Descripción completa

Detalles Bibliográficos
Autor Corporativo: International Business Machines Corporation International Technical Support Organization. Content Provider (content provider)
Otros Autores: Rayns, Chris, author (author), Rayns, Chris Contributor (contributor)
Formato: Libro electrónico
Idioma:Inglés
Publicado: [Place of publication not identified] IBM International Technical Support Organization 2007
Edición:2nd ed
Colección:IBM redbooks Securing DB2 and implementing MLS on z/OS
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628390006719
Descripción
Sumario:Today's computing environment is subject to increasing regulatory pressures and potentially malicious attacks. Regulatory compliance, security, and audit are in the daily headlines and growing more prominent.The security of the information to which you have been entrusted has never been more critical. The reality of compliance is too complex. Compliance demands that you work carefully to set up a strong, comprehensive set of policies and controls. That means controls that consider operational data, financial data, unstructured data, spreadsheets, e-mail, and business intelligence data. We have a responsibility to secure all business data and especially sensitive customer data. Security can be difficult to manage. IBM DB2 for z/OS already resides on one of the most secure platforms in the industry. IBM System z servers are routinely used by enterprises around the world to support their mission-critical applications. The mainframe's strengths in security stem in part from its history of supporting sensitive data for large enterprises, resulting in security features being built into its design for many decades. It also benefits from a system-wide approach with security capabilities built into the hardware, operating systems, databases, key middleware and more. Its highly evolved layers and security management components give it a fundamental advantage over other systems.
Notas:Bibliographic Level Mode of Issuance: Monograph
Descripción Física:1 online resource (xvi, 360 p.) : ill
Bibliografía:Includes bibliographical references and index.