Use of system utilities The use of utility programs that - CSA. Security requirements of information systems Objective: To ensure that security is an integral part of information systems. A. 1. 2. 2 Correct processing in applications Objective: To prevent errors, loss, unauthorized modi. Fcation or misuse of information in application A. Cryptographic controls Objective: To protect the con. 1154 Use of system utilities The use of utility programs that might be capable from CS 3510 at Kennesaw. 11.5.4 Use of system utilities The use of utility programs that might be capable of overriding system and application controls should be restricted and. The CICS utility programs are provided with some sample job streams that you can use to run them. Reading log streams using batch jobs (for example, DFHJUP) You can run a batch job, such as DFHJUP, to read and process CICS log data in MVS system. Fdentiality, authenticity or integrity of information by cryptographic means. A. 1. 2. 1. 1 Security requirements analysis and specifications A. Input data validation A. Control of internal processing A. Message integrity A. Output data validation A. Policy on the use of cryptographic controls A.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
January 2017
Categories |