19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

said that fewer are required. Furthermore, administration and implementation<br />

costs are normally also lower, because security services do not have to be<br />

implemented in a wide variety of applications. In this way even "exotic"<br />

applications – which do not have their own security functionality – can<br />

exchange data securely.<br />

In many cases it is a good idea to use a combination of cryptographic services<br />

on different layers. <strong>The</strong> form that this will take depends on the specific<br />

security requirements and the conditions of use, such as costs, performance<br />

and the extent to which the relevant components are available. Other crucial<br />

factors include the assumed threads which the implemented security services<br />

are intended to counteract, and the underlying system architecture.<br />

Security terminals security coupling elements<br />

Security systems can take the form of a terminal device or part of a terminal<br />

device, or of a coupling element or part of a coupling element. Coupling<br />

elements may be active network components, for example, such as routers or<br />

gateways.<br />

In contrast with terminal devices, security coupling elements usually have two<br />

network interfaces, which are coupled to a layer that is typical for that system<br />

via a crypto module (hardware or software). One interface is connected to the<br />

"secure" network (e.g. an in-house network), while the other interface is<br />

connected to the network considered "insecure" (e.g. a public network).<br />

Security terminals have the advantage that the security mechanisms can be<br />

closely adapted to the requirements of the application. Typical security<br />

terminals include crypto telephones, crypto fax machines or<br />

hardware/software-based security solutions for PCs. Security terminals<br />

generally provide solutions for individual workstations. In some cases these<br />

solutions support only one service. <strong>The</strong> boundaries are fluid, however (such as<br />

in the case of telephony via an Internet PC, or a crypto telephone with a data<br />

input). In terminal devices, as opposed to coupling elements, the choice of<br />

security layer is not restricted, because terminals are generally complete – in<br />

other words they have 7 layers.<br />

Security coupling elements are often designed with sufficient performance<br />

capability to be able to provide security for large work units, up to and<br />

including entire properties. <strong>The</strong> manufacturers of these systems try to support<br />

as many services and higher-level protocols as possible, so as to enable them<br />

to be put to universal use. <strong>The</strong> fact that they are largely independent of the<br />

operating systems on the terminals also contributes to the universal<br />

applicability of coupling elements. It is of course also possible to protect<br />

individual terminals with security coupling elements. <strong>The</strong> performance<br />

capability of the equipment, however, often results in higher costs. Coupling<br />

elements are by definition incomplete OSI systems. Consequently the<br />

implementation of security services is also limited to the layers where the<br />

coupling element is located.<br />

<strong>The</strong>re are also mixed forms in use. This relies on the precondition that security<br />

terminals and security coupling elements must be dovetailed with each other,<br />

particularly with regard to the security mechanisms and security parameters<br />

that they use (such as cryptographic keys).<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!