> While z/OS is probably immune to executables being introduced from
> outside, how vulnerable is....

This really isn't a safe assumption, so all of the subsequent questions are 
kind of irrelevant. Yes, it is possible to configure a z/OS system so that it 
is extremely difficult to break into, but when you present a harder target, the 
universe just coughs up a better class of hacker in return. Sort of a yin and 
yang thing I guess. Anyway,  I recommend taking the time to read this wiki post 
on Stuxnet and then play a few "what if?" scenarios in your head. Very 
sobering.  

Enjoy <http://en.wikipedia.org/wiki/Stuxnet> 

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to