19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

S 4.61 Use of security mechanisms offered by ISDN<br />

components<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Administrators<br />

If ISDN cards with security functions such as those listed below have been<br />

procured for the <strong>IT</strong> system or router in accordance with S 2.106 Purchase of<br />

suitable ISDN cards, they should be used in an appropriate manner as<br />

described in S 5.46 Authentication via CLIP/COLP, S 5.47 Callback based on<br />

CLIP/COLP, S 5.48 Authentication via PAP/CHAP and S 4.34 Use of<br />

encryption, checksums and digital signatures:<br />

- Capability to perform authentication via PAP and CHAP (Password<br />

Authentication Protocol and Challenge Handshake Authentication<br />

Protocol, RFC 1994)<br />

- Use of a hardware or software-based encryption techniques<br />

(symmetric/asymmetric)<br />

- Possibility of evaluating CLIP (Calling Line Identification Presentation)<br />

call numbers for the purpose of authentication<br />

- Possibility of maintaining a table of call numbers for performing callbacks<br />

- Possibility of logging unsuccessful attempts at establishing links (refusal<br />

due to incorrect authentication of call numbers or PAP/CHAP)<br />

A prerequisite here is that all communications partners should be in<br />

possession of ISDN cards equipped with security functions which are identical<br />

to the greatest possible extent.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!