19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

<strong>The</strong>se files are particularly sensitive on proxy-servers, because on such<br />

servers, every external WWW-access attempt by all staff is logged, including<br />

the IP number of the client which started access and the requested URL.<br />

<strong>The</strong>refore, a badly administrated proxy-server can lead to severe violations of<br />

data protection regulations.<br />

Most browsers gather a lot of information on users and their utilisation<br />

profiles: Firstly, users might not want these details to be disclosed, and<br />

secondly, superfluous information of this nature can block the available<br />

storage space on the computer. <strong>The</strong>se data include:<br />

- Favourites<br />

- WWW pages which have been invoked<br />

- News-server visits (see below)<br />

- History database (see below)<br />

- URL list (list of the last URLs which have been called)<br />

- Cookie list<br />

- <strong>Information</strong> on users who are stored in the browser and whose details<br />

might be forwarded (see below)<br />

- <strong>Information</strong> in the cache (see below)<br />

<strong>Information</strong> on news-server visits<br />

Most browsers are able to directly access news servers.<br />

In this process, Netscape notes the sequential numbers of the news items<br />

which have been read. This allows the determination of user profiles which<br />

also indicate the newsgroups and news items accessed by a user.<br />

Microsoft’s Internet Explorer goes a step further and stores the entire contents<br />

of all accessed news items.<br />

History database<br />

<strong>The</strong> history database of the Internet Explorer contains a complete collection of<br />

all activities performed with this browser, i.e. details on pictures which have<br />

been viewed, addresses, internal confidential documents which have been<br />

read, etc.<br />

As a result, the history database quickly takes up a lot of storage space, so that<br />

it needs to be cleared on a regular basis. <strong>The</strong> files in the history database<br />

should not simply be deleted; instead, they should be replaced by prepared<br />

copies of an empty history database, as certain entries need to be retained.<br />

<strong>Information</strong> on users<br />

Browsers also store, and sometimes forward, various details concerning users,<br />

e.g. real name, e-mail address, organisation. To prevent flooding by e-mail<br />

advertisements, it is advisable to use the browser under an alias name.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!