19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Personnel Remarks<br />

____________________________________________________________________ .........................................<br />

Use of cryptographic methods<br />

Provided they are used properly, cryptographic methods are excellently suited<br />

to countering the following threats:<br />

- Disclosure of information to unauthorised persons<br />

- Deliberate manipulation of data by unauthorised persons<br />

- Manipulation of the authorship of information<br />

<strong>The</strong> use of cryptography alone, however, is not sufficient to ward off all<br />

threats.<br />

- <strong>The</strong> use of cryptographic methods does not make any contribution to<br />

guaranteeing the availability of data (if encryption is used inappropriately,<br />

there is even a risk that data will be lost).<br />

- Cryptographic methods cannot achieve anything against denial-of-service<br />

attacks (see also T 5.28 Denial of services). <strong>The</strong>y may play a part in the<br />

early detection of such attacks, however.<br />

- <strong>The</strong>y also do not help to prevent the random corruption of information (for<br />

example as a result of noise), but they can make it possible to detect<br />

corruption retrospectively.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!