19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

S 4.30 Utilisation of the security functions offered in<br />

application programs<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: <strong>IT</strong>-user<br />

Several standard products in the PC sector offer a number of useful <strong>IT</strong> security<br />

functions; while these may be of varying quality, they discourage<br />

unauthorised persons and/or prevent potential damage. <strong>The</strong> following is a<br />

brief account of five useful functions of this type:<br />

- Password protection when calling up a program: the program can onlybe<br />

started if a correct password has been previously entered. This will prevent<br />

any unauthorised use of the program.<br />

- <strong>Protection</strong> of access to individual files: the program can only access a<br />

protected file if the password associated with that file is entered in its<br />

correct form. This will prevent unauthorised access to certain files by<br />

means of the program.<br />

- Automatic saving of intermediate data: the program will make an<br />

automatic backup of intermediate data so that any power failure will only<br />

affect those data changes which were made after that automatic backup.<br />

- Automatic saving of the precursor file: if a file is saved when a file with the<br />

same name exists in the indicated path, the second file will not be deleted<br />

but will be labelled differently. In this way, inadvertent deletion of an<br />

identically named file will be avoided.<br />

- Encryption of data: the program can save a file in an encrypted form so<br />

that its unauthorised disclosure can be prevented. Thus, the contents of the<br />

file will be available only to those who have the secret key used for that<br />

purpose.<br />

- Automatic display of macros in data files: This helps to prevent inadvertent<br />

execution of macros (macro viruses).<br />

Depending on the software used and the existing additional security functions,<br />

it may be advisable to make use of such functions. For <strong>IT</strong> systems in mobile<br />

use, it may be particularly expedient to use password protection during<br />

program call-up and automatic backup.<br />

Additional controls:<br />

- Which security functions are offered by the software products used?<br />

- Which of these functions are being regularly used?<br />

- Are the users notified of these functions?<br />

- Are the security-relevant instructions in manuals and certification reports<br />

adhered to?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!