|
Tell him to stick with the iSeries but leave the second machine not connected to a network. "When" everything gets hacked, the off-line box can't/won't be touched. And sorry, I can't quit laughing. Even if hackers decided to focus on the iSeries, and even if they managed to find a vulnerability, and even if that vulnerability was serious to grant secofr privs, and even if they knew what to do with said privs (which could imply specific knowledge of your homegrown app), they'd still have to hack both your primary & secondary systems at the same time for it to work. Really, in terms of risk mitigation, this is about as near the bottom of the list as you can get. The odds of your data centers being broken into simultaneously are far higher than any serious damage from a hacker in this case. Get a DR plan, harden your network, and wash your hands of it. Now, for the paranoid question: Is this just a roundabout way of moving the app off the iSeries? John A. Jones, CISSP Americas Information Security Officer Jones Lang LaSalle, Inc. V: +1-630-455-2787 F: +1-312-601-1782 john.jones@xxxxxxxxxx -----Original Message----- From: Chris Bipes [mailto:chris.bipes@xxxxxxxxxxxxxxx] Sent: Thursday, December 16, 2004 1:50 PM To: 'midrange-l' Subject: Alternate to iSeries The owner of CrossCheck has asked me to find an alternate platform to run our authorization system on. It is an in-house grown RPGLE application. Does IBM offer an RPGLE compiler for their pSeries systems? We will still have our current iSeries based system but also offer a second system running with a different OS. The owner feels that if terrorist were to ever hack iSeries and bring then down world wide, we would still have our secondary system running. He does not like any single point of failure, which is why we have two locations across the US. What other systems can I run DB2 and RPGLE on? Ok quit laughing 8-) he is serious. Christopher K. Bipes Manager of Systems Administration CrossCheck, Inc. -- This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list To post a message email: MIDRANGE-L@xxxxxxxxxxxx To subscribe, unsubscribe, or change list options, visit: http://lists.midrange.com/mailman/listinfo/midrange-l or email: MIDRANGE-L-request@xxxxxxxxxxxx Before posting, please take a moment to review the archives at http://archive.midrange.com/midrange-l. This email is for the use of the intended recipient(s) only. If you have received this email in error, please notify the sender immediately and then delete it. If you are not the intended recipient, you must not keep, use, disclose, copy or distribute this email without the author's prior permission. We have taken precautions to minimize the risk of transmitting software viruses, but we advise you to carry out your own virus checks on any attachment to this message. We cannot accept liability for any loss or damage caused by software viruses. The information contained in this communication may be confidential and may be subject to the attorney-client privilege. If you are the intended recipient and you do not wish to receive similar electronic messages from us in future then please respond to the sender to this effect.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.