I may be called ignorant and a mainframe bigot, but I read to this point 

Ayoub Elaasal, security auditor for Wavestone, though it might be fun to try. 
Sadly, he was able to find an exposure in z/OS rather fast, the ability of 
almost any user to edit the APF (authorized program facilities) and give 
yourself root access. At this point, you can do almost anything. 
? on a lab system somewhere ? 

and hit my self in the head, so edit APF, hum how, parmlib, every place I've 
worked parmlib was secure and the SETPROG command is secure, then further on 
root access? hum, sounds like Unix system services not z/os services 
sorry - snow day today - slow news day 


Carmen Vitullo 

----- Original Message -----

From: "Mark Regan" <marktre...@gmail.com> 
To: IBM-MAIN@LISTSERV.UA.EDU 
Sent: Tuesday, January 16, 2018 9:00:57 AM 
Subject: Fwd: Are Mainframes a Security Risk? | Enterprise Systems Media 

http://enterprisesystemsmedia.com/article/are-mainframes-a-security-risk 

---------------------------------------------------------------------- 
For IBM-MAIN subscribe / signoff / archive access instructions, 
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN 


----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to