When I worked for a large computer manufacturing company in 1984, I would go
with their corporate audit team to attempt to penetrate their in house MVS
systems. We would, depending on the site managers wishes, either attempt to
access critical data from normal TSO userid's, or we would attempt to access
the mainframe without any TSO id's given to us. In the case of working
without any TSO id's we still had physical access to terminals and
programmers offices, so unlocked desks and trash cans were fair game. In 8
audits of sites all over the world, we never failed to gain access to
critical data.  The ways in which we penetrated the systems lead to many of
the changes implemented in the way RACF was suggested to be used. We also
had lists of hundreds of ways to penetrate the system from unauthorized
userids, using "clever" attacks and unprotected control elements or
restricted utilities. Since 1984 the list of areas that can be exploited to
gain access to data, both protected and unprotected,  has grown
proportionally and though the systems can be secured much more tightly now,
any system that is accessible by users who are not inside a secured area, in
my humble opinion, can be hacked, if you define hacked as gaining
unauthorized access to sensitive data. We sometimes sat down with dumps and
disassembled user written SVC's and exit modules to exploit programming
errors. A patient hacker can gain access eventually. I think, the time,
knowledge, and effort to do this today, is simply not worth the potential
penalties when caught after the fact IMHO. Those who have the knowledge to
do the break in's are usually employed in positions to stop the break in's.
but with zIIP's and IFL's and zAAP's there are just getting to be so many
places to keep track of....

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to