19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

Multiple protection on various OSI layers<br />

<strong>The</strong>re is no objection to multiple protection of the transmitted information on<br />

different layers of the OSI model, provided certain rules are observed. In<br />

products that conform to the relevant standards, though, this is implicitly<br />

guaranteed. Especially with regard to encryption, it is necessary to apply<br />

bracket rules, familiar from school. Accordingly, encryption corresponds to<br />

opening a bracket, and decryption to closing a bracket. Between these brackets<br />

it is possible, in turn, to apply additional security mechanisms.<br />

Multiple protection can also have a detrimental effect, in that data throughput<br />

may be reduced as a result of additional operations or that the amount of user<br />

data that can be transmitted is smaller, for the same reason, or that additional<br />

data has to be transmitted in order to increase redundancy (for example<br />

cryptographic checksums). Multiple protection is also obtained implicitly if<br />

data is secured by means of crypto systems before it is transferred, for<br />

example in the case of digitally signed documents. This increases the security<br />

of the data transfer with respect to the security services used.<br />

Often it is only possible to ensure the security of an entire system by<br />

combining several security protocols or security products. If, for example,<br />

application-oriented security solutions are available but the trustworthy<br />

implementation of these solutions has not been (independently) scrutinised<br />

(e.g. by evaluation according to <strong>IT</strong>SEC or CC), and at the same time there are<br />

trustworthy transport-oriented security products available for protecting<br />

insecure network sections between remote properties, it may be possible to<br />

create an overall security solution to satisfy the requirements by combining<br />

the safeguards. Usually the increased administration expenditure and/or higher<br />

procurement costs prove disadvantageous in such cases.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!