19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

S 4.28 Software re-installation in the case of change of laptop<br />

PC users<br />

S 4.29 Use of an encryption product for laptop PCs<br />

S 4.30 Utilisation of the security functions offered in<br />

application programs<br />

S 4.31 Ensuring power supply during mobile use<br />

S 4.32 Physical deletion of data media before and after usage<br />

S 4.33 Use of a virus scanning program when exchanging of<br />

data media and data transmission<br />

S 4.34 Using encryption, checksums or digital signatures<br />

S 4.35 Pre-dispatch verification of the data to be transferred<br />

S 4.36 Blocking specific fax recipient numbers<br />

S 4.37 Blocking fax sender numbers<br />

S 4.38 Deactivation of unnecessary service features<br />

S 4.39 Deactivation of answering machines for periods of<br />

absence<br />

S 4.40 Preventing unauthorised use of computer microphones<br />

S 4.41 Use of a suitable PC security product<br />

S 4.42 Implementation of security functions in the <strong>IT</strong><br />

application<br />

S 4.43 Fax machine with automatic envelope sealing system<br />

S 4.44 Checking of incoming files for macro viruses<br />

S 4.45 Setting up a secure Peer-to-Peer environment<br />

S 4.46 Use of the log-on password under WfW and Windows<br />

95<br />

S 4.47 Logging of firewall activities<br />

S 4.48 Password protection under Windows NT<br />

S 4.49 Safeguarding the boot-up procedure for a Windows NT<br />

system<br />

S 4.50 Structured system administration under Windows NT<br />

S 4.51 User profiles to restrict the usage possibilities of<br />

Windows NT<br />

S 4.52 <strong>Protection</strong> of devices under Windows NT<br />

S 4.53 Restrictive allocation of access rights to files and<br />

directories underWindows NT<br />

S 4.54 Logging under Windows NT<br />

S 4.55 Secure installation of Windows NT<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!