Visit the Enterprise Knights’ web app


Asymmetric Key Encryption

Explanation of how asymmetric key encryption works


Intro to AT-TLS and how it interacts with System SSL

Authorized QNames

Explanation of ENQ QName naming conventions for authorized programs

Buffer Overflow

Explanation of how unchecked variable length fields can lead to buffer overflows

Common Vulnerability Scoring System

Introduction to CVSS data that aids in understanding the urgency and applicability of IBM Z security fix data

Control Block Masquerade

Explanation of how control blocks need to be verified in PC and SVC routines


Overview of the ETDEF service in defining a PC routine

IBM Z Security Portal

This video provides a brief introduction to the IBM Z Security Portal, how to register and what you will find


Overview for the first RACF Health Check

Symmetric Key Encryption

Explanation of how symmetric key encryption works

Three Properties of Authorization

Overview of three properties of authorization on Z

TLS/SSL Cipher Lists

Explains how cipher lists are defined and interpreted in TLS/SSL

Untrusted Indirect Parameters

Explanation of how multiple levels of indirection to untrusted parameters are handled by a PC available to unauthorized callers

Untrusted Regs for PCs/SVCs

Explanation of how parameters from an unauthorized requester are not to be trusted in a PC target routine


Introduction to z Encryption Readiness Technology functionality