19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

User, control and management information<br />

A user is primarily interested in the transmission of user information to remote<br />

users. Depending on the actual reference model being used, however (e.g.<br />

ISDN), control, signalling and management information is also transferred<br />

between the systems (terminal devices, coupling elements) for the purpose of<br />

setting up and clearing down connections, negotiating quality of service<br />

parameters, and configuring and monitoring the network by network providers<br />

etc.<br />

<strong>The</strong> network concerned has the task of transmitting user information without<br />

changing it and without interpreting it; i.e. only the terminal devices must be<br />

capable of interpreting user information. In this way the information can be<br />

secured irrespective of the rest of the network infrastructure, if necessary even<br />

using proprietary security functions (closed user group). It must be possible<br />

for control, signalling and management information on the transport layers to<br />

be evaluated, modified or generated by network elements belonging to the<br />

network provider. As a result, this information largely avoids any protection<br />

provided independently of the network provider (e.g. encryption). <strong>The</strong><br />

safeguarding of this information calls for trusting co-operation with the<br />

network provider, as well as application of the relevant standards. Threats may<br />

arise from the fact that the security functions of certain products are<br />

incorrectly assessed. When cryptographic devices are selected, it is essential to<br />

examine precisely which components of the information are secured or<br />

filtered. Likewise, looking at it the other way, it is necessary to check which<br />

information remains unsecured despite the use of crypto devices, and to what<br />

extent this can be tolerated.<br />

Example: With ISDN, the user information is generally carried via the B<br />

channels. However, the D channel, which is primarily used for signalling, can<br />

also be used for the transmission of packetised data. If the objective is to<br />

protect all user data, it is plain that safeguarding the B channels is not<br />

sufficient in cases where packetised data is transmitted via the D channel.<br />

Security in circuit-switched networks<br />

In circuit-switched networks, the establishment of a connection sets up<br />

channels of a defined bandwidth, which are exclusively available to the<br />

communicating parties. After the connection has been established, the user<br />

data is transmitted, then the connection is cleared down. <strong>The</strong> network provider<br />

can set up fixed connections, in which case there is no need for the connection<br />

to be established and cleared down – usually performed by the subscriber. One<br />

example of a circuit-switched network is ISDN.<br />

When a connection is established, user data channels are set up between the<br />

communication partners on OSI layer 1; in ISDN these are referred to as B<br />

channels. In order to ensure the confidentiality of the transferred user data, the<br />

channel can be encrypted. If it is also intended to secure the signalling<br />

channel, in the case of N-ISDN therefore the D channel (layers 1-3), it must be<br />

borne in mind that both the communication partner’s terminal and the network<br />

provider’s exchanges can appear as distant stations for a terminal transmitting<br />

data. <strong>The</strong> D channel is not normally encrypted, because this would mean<br />

imposing particular requirements on the network provider. In this case<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!