19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

- A suitable key should be selected. If possible, it should be generated<br />

randomly. If a key can be chosen like a password, the relevant instructions<br />

contained in S 2.11 Provisions governing the use of passwords must be<br />

observed.<br />

- <strong>The</strong> encrypted text and keys must not be stored together on a single data<br />

medium. This can be implemented by writing the key down on a piece of<br />

card and then storing it like a credit card in one's wallet. If the keys are<br />

stored on floppy disks, these should be kept separate from the <strong>IT</strong> system.<br />

Additional controls:<br />

- Are users trained to use encryption products?<br />

- Which encryption algorithms are used?<br />

- Are the data and keys stored separately?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Choose suitable key<br />

Keep ciphertext and key<br />

separate

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!