ibm-information-center/dist/eclipse/plugins/i5OS.ic.rzaj4_5.4.0.1/rzaj4secoverview.htm

94 lines
6.3 KiB
HTML
Raw Normal View History

2024-04-02 14:02:31 +00:00
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en-us" xml:lang="en-us">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="security" content="public" />
<meta name="Robots" content="index,follow" />
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
<meta name="DC.Type" content="topic" />
<meta name="DC.Title" content="iSeries and Internet security" />
<meta name="abstract" content="Accessing the Internet from your LAN is a major step in the evolution of your network that will require you to reassess your security requirements." />
<meta name="description" content="Accessing the Internet from your LAN is a major step in the evolution of your network that will require you to reassess your security requirements." />
<meta name="DC.Relation" scheme="URI" content="rzaj4pntprint.htm" />
<meta name="DC.Relation" scheme="URI" content="rzaj45asecureway.htm" />
<meta name="DC.Relation" scheme="URI" content="rzaj45zssecurityplanning.htm" />
<meta name="DC.Relation" scheme="URI" content="rzaj4securityreadiness.htm" />
<meta name="DC.Relation" scheme="URI" content="rzaj45zgiptraffic.htm" />
<meta name="DC.Relation" scheme="URI" content="rzaj45zrscenario1risks.htm" />
<meta name="DC.Relation" scheme="URI" content="rzaj45zhcryptointro.htm" />
<meta name="DC.Relation" scheme="URI" content="rzalxsecterms.htm" />
<meta name="copyright" content="(C) Copyright IBM Corporation 1999, 2006" />
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 1999, 2006" />
<meta name="DC.Format" content="XHTML" />
<meta name="DC.Identifier" content="secoverview" />
<meta name="DC.Language" content="en-us" />
<!-- All rights reserved. Licensed Materials Property of IBM -->
<!-- US Government Users Restricted Rights -->
<!-- Use, duplication or disclosure restricted by -->
<!-- GSA ADP Schedule Contract with IBM Corp. -->
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
<link rel="stylesheet" type="text/css" href="./ic.css" />
<title>iSeries and
Internet security</title>
</head>
<body id="secoverview"><a name="secoverview"><!-- --></a>
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
<h1 class="topictitle1">iSeries and
Internet security</h1>
<div><p>Accessing the Internet from your LAN is a major step in the evolution
of your network that will require you to reassess your security requirements.</p>
<p><img src="./delta.gif" alt="Start of change" />Fortunately, your IBM<sup>®</sup> <img src="eserver.gif" alt="eServer" /> iSeries™ server
has integrated software solutions and security architecture to let you build
a strong defense against potential Internet security pitfalls and intruders.
Properly using these iSeries security offerings ensures that your customers,
employees, and business partners can obtain the information they need to
do business with you in a secure environment.<img src="./deltaend.gif" alt="End of change" /></p>
<p><img src="./delta.gif" alt="Start of change" />You can use the information that you find here to educate
yourself about well-known security threats and how these risks relate to your
Internet and e-business goals. Also, you will learn how to assess the risks
versus the benefits of using the various security options that iSeries provides
for dealing with these risks. And finally, you can determine how you can use
this information to develop a network security plan that fits your business
needs.<img src="./deltaend.gif" alt="End of change" /></p>
</div>
<div>
<ul class="ullinks">
<li class="ulchildlink"><strong><a href="rzaj4pntprint.htm">Printable PDF</a></strong><br />
Use this to view and print a PDF of this information.</li>
<li class="ulchildlink"><strong><a href="rzaj45asecureway.htm">iSeries and Internet security considerations</a></strong><br />
<span><img src="./delta.gif" alt="Start of change" />As an iSeries owner
exploring options for connecting your systems to the Internet, one of the
first questions you will typically ask is, "How do I begin to use the Internet
for business purposes?" The second question is, "What should I know about
security and the Internet?" The focus of this material is to help you to
answer this second question.<img src="./deltaend.gif" alt="End of change" /></span></li>
<li class="ulchildlink"><strong><a href="rzaj45zssecurityplanning.htm">Planning Internet security</a></strong><br />
<span>Use this information to gain a general
understanding of the strengths of iSeries security for e-business and the iSeries security
offerings available to you.</span></li>
<li class="ulchildlink"><strong><a href="rzaj4securityreadiness.htm">Security levels for basic Internet readiness</a></strong><br />
<span>Use
this information to learn what system security you should have in place before
you connect to the Internet.</span></li>
<li class="ulchildlink"><strong><a href="rzaj45zgiptraffic.htm">Network security options</a></strong><br />
<span>Use this information to learn about
the network level security measures that you should consider using to protect
your internal resources.</span></li>
<li class="ulchildlink"><strong><a href="rzaj45zrscenario1risks.htm">Application security options</a></strong><br />
<span>Use this information to learn about
common Internet security risks for a number of popular Internet applications
and services and measures that you can take to manage these risks.</span></li>
<li class="ulchildlink"><strong><a href="rzaj45zhcryptointro.htm">Transmission security options</a></strong><br />
<span>Use this information to learn about
the security measures that you can use to protect your data as it flows across
an untrusted network, such as the Internet. Learn more about security measures
for using the Secure Sockets Layer (SSL), iSeries Access Express, and Virtual Private
Network (VPN) connections.</span></li>
<li class="ulchildlink"><strong><a href="rzalxsecterms.htm">Security terminology</a></strong><br />
This topic includes terms and definitions related to security information.</li>
</ul>
</div>
</body>
</html>