19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

S 4.2 Screen lock<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: <strong>IT</strong>-user<br />

Screen lock refers to the possibility of concealing information currently<br />

displayed on the screen. Such a screen lock should be activated when the user<br />

leaves the workstation for only a short time. Automatic activation of the<br />

screen lock in case of a prolonged break period should be included as an<br />

additional feature. If the software product also provides for password query,<br />

access protection for the <strong>IT</strong> system will be additionally ensured during the<br />

absence of the <strong>IT</strong> user concerned.<br />

Password-supported screen lock is offered by MS Windows 3.x as a screen<br />

saver. However, its documentation points out that if the current application is<br />

a non-Windows application, the screen saver will not be activated<br />

automatically, regardless of whether the application is executed in a window,<br />

from the MS-DOS command line or as a symbol. Under Windows 95,<br />

however, the screen saver will also be automatically activated when using<br />

MS-DOS applications. Apart from MS Windows, there are other products<br />

offering password-supported screen savers. Before employing such products,<br />

it should be checked whether the screen lock will work under all applications.<br />

Under UNIX, screen lock can be achieved with programs such as lock or,<br />

under X Windows, lockscreen.<br />

Additional controls:<br />

- Has a screen lock been installed on the respective computers?<br />

- Is consistent use being made of the screen lock feature?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!