Articles & Content

Archives

Best Practices in DB2 Security (A02)

Topic: DB2 for z/OS

Subtopic: 2007



DATE: 2007-11-5 (13:30 - 14:30)
SPEAKERS: Roger Miller (IBM Silicon Valley Lab)

Security is in the headlines and growing much more important. This session will discuss various practices for security and discuss how you can make improvements. The discussion includes various security objectives. Most sites have a range of needs and objectives. For some situations, basic security is adequate. For others better or standard security techniques are needed. In other cases, best security practices are demanded. Our tools range from very tight system security to basic techniques, applicable with public information on the web. Application security techniques are more flexible, but require much more work by more people, so they are generally weaker. Choices and guidelines will be our primary points, discussing how to provide improved security for your situation. We will point to many other suggested resources.

EXP. LEVEL: Intermediate,Advanced

OBJECTIVES:

Security policy and objectives

Range of techniques

Practices: Basic, Standard, Best

Best practices and improvements

Checking and auditing



Click Here to Download

NOTE: These are only open to members of IDUG. If you are not a member, please CLICK HERE for more information.