Threats and Exposures
This section contains the following topics:
z/OS Integrity
Authorized Programs
z/OS Utilities
Program Properties Table
Address Space Security Bypass
VTAM and TCAM Terminal Definitions
JES Considerations
User SVCs
System Modifications
Tape Security
SYSGENs
SMF
SYSLOG
LOGREC
PARMLIB Members
PROCLIB
Storage Modifications
System Data Sets
Alternate Volumes
Exits