19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

S 5.40 Secure integration of DOS-PCs to a Windows<br />

NT network<br />

Initiation responsibility: Head of <strong>IT</strong> section, <strong>IT</strong> security management,<br />

Administrator<br />

Implementation responsibility: Administrator, <strong>IT</strong> users<br />

DOS-PCs can be integrated into Windows NT networks in different ways, for<br />

example via TCP/IP or the Peer-to-Peer functions of Windows for<br />

Workgroups. In contrast to Windows NT systems, DOS-PCs contain less<br />

security mechanisms. Everyone with access to a PC can administrate it, thus<br />

being able, for example, to change settings or install software.<br />

By installing the appropriate software, a networked PC can be used to<br />

eavesdrop the network. <strong>The</strong>refore only authorised users may have access to a<br />

PC (see also S 1.23 Locked doors and S 2.6 Granting of site access<br />

authorisations). Furthermore, it must be ensured that software is not installed<br />

without supervision; this should regularly be checked. (see also S 2.9 Ban on<br />

using non-approved software and S 2.10 Survey of the software held).<br />

In addition, it is easily possible by changing the configuration of a PC, to fake<br />

any computer ID and thus carry out a masquerade.<br />

Computer viruses occur mainly on DOS PC’s. When PC’s are networked with<br />

Windows NT systems, viruses can spread by infected programmes passing<br />

from PC to PC. <strong>The</strong>refore, the same safeguards must be implemeted here as<br />

for the exchange of programmes via data-media or Remote Data Transfer (see<br />

also S 4.3 Periodic runs of a virus-detection programme). File-viruses only<br />

pose a threat if they are in a position to change executable files under<br />

Windows NT in such a way that they can still be executed. However, under<br />

certain conditions computer-viruses that threaten to change the boot sector of<br />

Intel-based systems such as PCs, can also pose a threat to Windows NT<br />

systems on an Intel platform by leaving them in a non-bootable state. This can<br />

be avoided by changing the boot sequence (see S 4.3 Periodic runs of a virusdetection<br />

programme).<br />

<strong>The</strong> largest threat that computer-viruses pose for Windows NT systems are on<br />

PCs that have access to shared directories on the Windows NT system.<br />

Computer-Viruses that change or delete files or directories on a PC can also<br />

access shared directories of a Windows NT system and destroy them.<br />

<strong>The</strong>refore, access rights for directories shared for network access should be<br />

restrictively provided. In particular, only read access should be provided for<br />

shared directories wherever possible.<br />

Generally, users under Windows NT should restrict the attributes of their files<br />

as much as possible so that, for example, other users cannot gain access to<br />

them or so that no write-access is possible to files that are not regularly<br />

changed. <strong>The</strong> appropriate settings should be made beforehand via the<br />

functions of access control (see also S 4.53 Restrictive allocation of access<br />

rights to files and directories under Windows NT). With this safeguard all files<br />

stored on the server will have sufficient protection; DOS-PCs cannot by-pass<br />

this protection.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!