19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

security. This also results in greater acceptance by users, who do not need to<br />

attend actively to the responsibility of virus protection. <strong>The</strong> users do not even<br />

notice that the virus scanning program is operating in the background, as long<br />

as no virus is detected. On detection of a virus, access to the infected file is<br />

denied, i.e. this file cannot be used any more as long as the virus protection<br />

remains active. At present, the use of memory-resident virus scanning<br />

programs under Windows operating systems constitutes the best possibility of<br />

protection against viruses, because every file can be checked before usage<br />

(opening for the purpose of editing, copying, printing, unpacking etc.) and<br />

blocked if a virus is detected.<br />

<strong>The</strong> use of checksum programs constitutes another preventive measure. In this<br />

case, checksums of the scanned files or system areas (e.g. the boot and<br />

partition sector) are computed at regular intervals to afford protection against<br />

changes. This not only allows the detection of unknown computer viruses, but<br />

also other unauthorised modifications to files.<br />

Procedures required in case of virus contamination are described under S 6.23<br />

Procedure in case of computer virus infection.<br />

Additional controls:<br />

- When was the last check made? Have the results been documented?<br />

- Have computer viruses been detected? If so, this might point to illicit use<br />

of unauthorised software.<br />

- When was the virus detection program in use last updated?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!