Security Management Guide (G06.29+, H06.08+, J06.03+)
Contents
Security Management Guide — 522283-021
v
7. Concerns for the User
Call-Back Routine 6-15
Automatic Terminal Authentication 6-16
Screening Dial-Up Users 6-16
Periodic Password and Phone Number Changes 6-17
Action If the Line Is Dropped 6-17
Installation Controls 6-17
Restricting Access to System Software 6-18
Operators and Privileges 6-18
Securing Network Access 6-19
Creating a Network User ID 6-19
Managing the Network User IDs 6-20
Security Precautions 6-20
Encrypting Data Between Nodes 6-20
Communicating With Other System Managers 6-20
7. Concerns for the User
Concerns for All Users 7-1
Protecting Your Password 7-1
Logging On 7-1
Changing Your Password 7-2
Choosing a Good Password 7-2
Protecting Your Terminal 7-3
Discovering When Others Use Your Terminal 7-3
Protecting Printouts 7-3
Logging Off 7-4
Concerns for the TACL User 7-4
TACL Features 7-4
How the System Identifies Users 7-4
Privileged User Classes 7-5
Group Membership 7-7
Privileges of Group Members 7-9
Guardian Security 7-9
Erasing Purged Files With CLEARONPURGE 7-13
TACL Process Security 7-14
Safeguard Access Control Lists (ACLs) 7-14
Encryption 7-16
Electronic Mail 7-16
Trojan Horses 7-17
Securing Your TACLCSTM and TACL Macro Files 7-18