Objective: In working with IBM z/VSE, you need to understand the importance of security and the facilities used by z/VSE to implement it. An installation’s data and application programs are among its most valuable resources. They must be protected from unauthorized access both internally (employees) and externally (customers, business partners, and hackers).
After completing this chapter, you will be able to provide the following information:
•Explain security concepts.
•Explain the Basic Security Manager (BSM) component ...