Thinking about it ... it would be far simpler (than anti-ransomware capability 
in storage, or lock-all behaviour) if there were a RACF HealthChecker that 
looks for abnormal enc/dec activity.
What 'normal' is can be learnt from a year's worth of actual enc/dec-related 
SMF data.

- KB

‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
On Monday, September 7, 2020 9:43 PM, kekronbekron 
<000002dee3fcae33-dmarc-requ...@listserv.ua.edu> wrote:

> WSL doesn't have anything to do with cloud.
> It's just the running of Linux within Windows, using bits of Hyper-V 
> internally, I think.
>
> That said, Joe's point about securing this new vector is one to pay attention 
> to.
> And since z/OS is also working on improving/expanding z/OS NFS 
> implementation.. I'm sure IBM will make it as securable as possible, as 
> always.
>
> -   KB
>
>     ‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
>     On Monday, September 7, 2020 8:56 PM, Steve Thompson ste...@copper.net 
> wrote:
>
>
> > So, does this mean that a cloud environment is more or less likely to be 
> > attacked than the same on premise environment?
> > Such an attack could cause a major disruption in operations and thinking.
> > Sent from my iPhone — small keyboarf, fat fungrs, stupd spell manglr. Expct 
> > mistaks
> >
> > > On Sep 7, 2020, at 11:20 AM, Joe Monk joemon...@gmail.com wrote:
> > > Let me tell you why it is not such a hypothetical problem...
> > > As we all know, Microsoft now allows under Windows for Linux, Windows
> > > access to Linux datastores. So, imagine I have a mainframe data store
> > > mounted as a Linux FS on a Windows box running Windows for Linux. Now, the
> > > windows box gets ransom'd ... what happens to the Linux FS mounted on the
> > > Windows box?
> > > In case you dont know about it:
> > > https://docs.microsoft.com/en-us/windows/wsl/install-win10
> > > Joe
> > >
> > > > On Mon, Sep 7, 2020 at 8:47 AM kekronbekron <
> > > > 000002dee3fcae33-dmarc-requ...@listserv.ua.edu> wrote:
> > > > "I see no relationship to the ransomware problem,..."
> > > > The whole topic is a hypothetical discussion.. don't know what to say 
> > > > for
> > > > the relation not being understandable.
> > > > Just a thought for damage control..
> > > > Obviously, obvious security measures have still let this hypothetical
> > > > problem through (either bypassed or less-than-optimal security 
> > > > measures)...
> > > > so fiddling with user accesses at this point is irrelevant.
> > > > Whole world knows how to prevent.. but actually doing it is a whole
> > > > another matter of tools, processes, capabilities, and such.
> > > >
> > > > -   KB
> > > >
> > > > ‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
> > > > On Monday, September 7, 2020 7:08 PM, R.S. 
> > > > r.skoru...@bremultibank.com.pl
> > > > wrote:
> > > >
> > > > > W dniu 07.09.2020 o 14:57, kekronbekron pisze:
> >
> > --
> > For IBM-MAIN subscribe / signoff / archive access instructions,
> > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>
> --
>
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to