19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

S 5.45 Security of WWW browsers<br />

Initiation responsibility: <strong>IT</strong> manager, network planner<br />

Implementation responsibility: Administrator, <strong>IT</strong> users<br />

When accessing the World Wide Web (WWW) various security problems can<br />

arise on the computers at the workstation. This can be due to faulty operation<br />

on the part of the user, insufficient browser configuration (i.e. the program<br />

being used to access the WWW), or weaknesses in the security of the browser.<br />

Local data can be under threat if, for example, programs are downloaded from<br />

the Internet and executed without confirmation on the local computer (e.g.<br />

ActiveX programs or Java-applets). Documents or pictures may also contain<br />

commands which will automatically be executed when viewed and can thus<br />

lead to damage (e.g. macro viruses in Winword or Excel documents). To<br />

avoid such problems, the safeguards described in the following should be<br />

implemented.<br />

Downloading files and/or programmes<br />

When files and/or programmes are downloaded, a considerable number of<br />

security problems can arise, the most well-known amongst these being<br />

viruses, macro-viruses and Trojan horses. Users should never rely on the fact<br />

that the downloaded files or programmes come from trustworthy sources.<br />

When the browser is configured, it must be ensured that the applications<br />

associated with files which may contain macro viruses are not started<br />

automatically (see also S 4.44 Checking incoming files for macro viruses).<br />

Every user must be reminded that he himself is responsible for taking the<br />

relevant precautions when downloading files. Even if the downloaded data is<br />

automatically tested for viruses by a firewall, the responsibility for the<br />

cleanliness of the files or programmes is still with the user. In principle, the<br />

internal security regulations of the organisation must naturally be observed<br />

during the installation of programs. In particular, only tested and approved<br />

programmes may be installed. Before installation, stand-alone computers<br />

should act as a testbed for the cleanliness of their programs.<br />

In case of doubt contact <strong>IT</strong> administration.<br />

Plug-ins and additional programs<br />

Not all browsers can process all file formats directly. This generally means the<br />

files cannot be displayed, and in some cases they cannot be played back. For<br />

some file formats, plug-ins or additional programs are also needed.<br />

Plug-ins are library files (e.g. DLL files) which are downloaded by installation<br />

programs into the plug-in directory and are executed with the invocation of the<br />

corresponding file format.<br />

Additional programs, such as viewers, are independent programs which are<br />

able to process certain file formats. <strong>The</strong> invocation of such an additional<br />

program is controlled using one of the browser's configuration files, in which<br />

the file extension and program are linked.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!