In <[EMAIL PROTECTED]>, on 06/20/2005
   at 09:23 PM, Bill Fairchild <[EMAIL PROTECTED]> said:

>An unauthorized attempt to access data set X could simply be due to a 
>typo.

Sure, and the security officer is probably aware of that. It's his
responsibility to investigate and to make the determination.

>Questioning the attempter is called for, 

At many shops the user will be (BTDTGTS) automatically suspended after
a small number of incidents. Unfortunately, one user action can
trigger a lot of access attempts, so it's easy to hit the threshold.
 
-- 
     Shmuel (Seymour J.) Metz, SysProg and JOAT
     ISO position; see <http://patriot.net/~shmuel/resume/brief.html> 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to