19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Personnel Remarks<br />

____________________________________________________________________ .........................................<br />

S 3.5 Education on <strong>IT</strong> security measures<br />

Initiation responsibility: Superiors, <strong>IT</strong> Security Management<br />

Implementation responsibility: Superiors, <strong>IT</strong> Security Management<br />

In the majority of cases, damage in the <strong>IT</strong> field is caused by negligence. In<br />

order to prevent this, everybody must be motivated to exercise care in the use<br />

of information technology. In addition, procedures must be provided which<br />

help the individuals concerned to better understand <strong>IT</strong> safeguards. In<br />

particular, the following subjects should be included in training on <strong>IT</strong> security<br />

safeguards:<br />

- Building <strong>IT</strong> security awareness<br />

Every staff member must be made aware of the need for <strong>IT</strong> security. A<br />

suitable first step for introducing staff to the subject is to make them aware<br />

of the dependence of the agency/company, and hence of their jobs, on the<br />

smooth functioning of <strong>IT</strong> systems. In addition, the value of information<br />

should be highlighted, especially with regard to confidentiality, integrity<br />

and availability. <strong>The</strong>se awareness-building activities should be repeated<br />

periodically, possibly also supplemented by practical information, e.g.<br />

through in-house circulars.<br />

- Staff-related <strong>IT</strong> safeguards<br />

Under this heading, information should be provided on all safeguards<br />

which have been developed within the framework of an <strong>IT</strong> security policy<br />

and which are to be implemented by the various staff members. This part<br />

of the training effort is very important since many <strong>IT</strong> safeguards can be<br />

applied effectively only after adequate education and motivation.<br />

- Product-related <strong>IT</strong> safeguards<br />

Under this heading, information is provided on <strong>IT</strong> safeguards inherent in a<br />

particular product and already present when the product is supplied. <strong>The</strong>se<br />

can, for example, be registration passwords, screensavers, or encryption<br />

features for documents or data fields. Recommendations regarding the<br />

structure and organisation of files containing transaction data can facilitate<br />

the granting of access rights and considerably reduce the work involved in<br />

data protection.<br />

- Conduct in the event that a computer virus appears on a PC<br />

Staff members should be instructed on how to handle computer viruses.<br />

Such training might cover the following (cf. S 6.23 Procedure in case of<br />

computer virus infection):<br />

- detection of computer infection,<br />

- action and types of computer viruses,<br />

- immediate response when virus infection is suspected,<br />

- measures to eradicate the computer virus,<br />

- preventive measures.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!