19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

S 5.31 Suitable modem configuration<br />

S 5.32 Secure use of communications software<br />

S 5.33 Secure remote maintenance via modem<br />

S 5.34 Use of one-time passwords<br />

S 5.35 Use of UUCP security mechanisms<br />

S 5.36 Encryption under UNIX and Windows NT<br />

S 5.37 Restricting Peer-to-Peer functions when using WfW,<br />

Windows 95 or Windows NT in a server-supported<br />

network<br />

S 5.38 Secure integration of DOS PC's into a UNIX network<br />

S 5.39 Secure use of protocols and services<br />

S 5.40 Secure integration of DOS-PCs to a Windows NT<br />

network<br />

S 5.41 Secure configuration of remote access under Windows<br />

NT<br />

S 5.42 Secure configuration of TCP/IP network administration<br />

under Windows NT<br />

S 5.43 Secure configuration of TCP/IP network services under<br />

Windows NT<br />

S 5.44 One-way connection setup<br />

S 5.45 Security of WWW browsers<br />

S 5.46 Installing stand-alone-systems for Internet use<br />

S 5.47 Configuration of a Closed User Group<br />

S 5.48 Authentication via CLIP/COLP<br />

S 5.49 Callback based on CLIP/COLP<br />

S 5.50 Authentication via PAP/CHAP<br />

S 5.51 Security-related requirements for communications links<br />

between telecommuting workstations and the institution<br />

S 5.52 Security-related requirements for communications<br />

computers<br />

S 5.53 <strong>Protection</strong> against mail bombs<br />

S 5.54 <strong>Protection</strong> against mail overload and spam<br />

S 5.55 Checking of alias files and distribution lists<br />

S 5.56 Secure operation of a mail server<br />

S 5.57 Secure configuration of mail clients<br />

S 5.58 Installation of ODBC drivers<br />

S 5.59 <strong>Protection</strong> against DNS spoofing<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!