I need some help with a few questions about z/os. If anybody has some extra time to explain or answer some of my questions I would be greatfull!! Here they are below:
How do Identity and Authorization (I&A) support the C-I-A model of security? Include information on access control, resource protection, and user provisioning.
Describe the difference between symmetrical and asymmetrical keys. Include a description of how each are used separately, and how both types of keys are used together, to provide security across unsecured networks.
Describe how the System z architecture provides security. Include information on process isolation and storage keys.
Describe how SAF and an External Security Manager work together to provide system security. Include what role each component plays, and how they interact with system components and applications.
Describe the C-I-A model of security. What are the three components of this model; why are they important to computer security; and how do they interact?
Where C-I-A means : Confidentiality Ã¢Â€Â“ Integrity - Availability