19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

S 5.13 Appropriate use of equipment for network<br />

coupling<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Head of <strong>IT</strong> Section, Administrator<br />

Devices used for network coupling such as routers, bridges or gateways not<br />

only connect networks, but can also be used for the physical or logical<br />

segmentation of networks. Availability can be enhanced by segmenting large<br />

networks into sub-networks, as a failure then affects only a limited part of the<br />

network and can be located more quickly. With an increasing number of<br />

network stations, response times can become unacceptable, and the need may<br />

arise to establish sub-networks for load balancing. <strong>Protection</strong> of sensitive<br />

information may be another reason for segmentation of networks so as to<br />

ensure that such information is not available throughout the network. For<br />

protection against external perpetrators, it may be advisable to allow transfer<br />

of packets only from a secure to a non-secure network; on the other hand, for<br />

protection of confidential data it may be advisable to bar transfer of packets<br />

from a secure to a non-secure network.<br />

A segmentation or coupling of networks can be performed on various layers in<br />

accordance with the OSI model. In this model, network coupling elements<br />

comprise, for example, repeaters on the physical layer (layer 1), bridges on the<br />

data link layer (layer 2), routers on the network layer (layer 3) and, in general,<br />

gateways on the application layer (layer 7). <strong>The</strong> illustration below is intended<br />

to provide a clearer understanding of the OSI model.<br />

<strong>The</strong> OSI/ISO reference model<br />

Connection with another network on a higher layer (from layer 3 onwards) of<br />

the OSI model allows, for example, the data flow to be regulated in<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!