19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

<strong>Information</strong> in the cache<br />

Internet Explorer, Netscape and other browsers generate large numbers of files<br />

in a cache directory. <strong>The</strong>se files contain the text and pictures from all Web<br />

pages visited since the last time the cache was deleted.<br />

<strong>The</strong> cache is intended to avoid a multiple loading of pages during a single<br />

session. However, the Internet Explorer does not independently delete these<br />

data, which are of no use in subsequent sessions, so that tens of megabytes of<br />

garbage accumulate in caches which are not deleted regularly. <strong>The</strong>se data can<br />

also be used to generate user profiles.<br />

For this reason, the cache should be deleted regularly, just like the history<br />

folder.<br />

Unfortunately, it is not always easy for users to find out how to empty the<br />

cache. In the case of the Internet Explorer under Windows 95 for example, the<br />

cache is emptied by selecting the option Empty folder under<br />

View/Options/Advanced/Temporary Internet Files/Settings.<br />

When WWW sites secured with SSL are accessed, this can, amongst other<br />

things, be used to transmit sensitive information such as credit card numbers<br />

over the Internet in encrypted form. Such pages should, therefore, not be<br />

stored in the cache in the first place. In the Internet Explorer, for example, this<br />

can be deactivated with "Do not save encrypted pages to disk" under<br />

Tools/Internet Options/Advanced/Security.<br />

Access to client hard disk<br />

With some browsers (e.g. Netscape or Microsoft Internet Explorer) the WWW<br />

servers will be given the opportunity to actively access the hard disk of the<br />

client (ActiveX, Java).<br />

Rather than being executed on the server, Java and ActiveX programmes will<br />

be executed on the client site via the browser. However, this transfers the<br />

security risk from the server to the client. <strong>The</strong>refore, various safeguards have<br />

been built into Java and ActiveX to prevent misuse. Many security pitfalls<br />

have nevertheless been discovered so far.<br />

Certain security risks exist when using browsers which allow access to the<br />

files of the client in connection with ActiveX and Java. Under certain<br />

conditions ActiveX allows local resources to be used. Access of this kind is<br />

also possible with Java, but only if the user explicitly allows it. <strong>The</strong> ActiveX<br />

security concept is based upon the user having confidence in the content<br />

provider and in an authentic third party in the World Wide Web. This<br />

confidence is problematic if the web-pages of unknown or new providers are<br />

called up.<br />

Due to the existing problems with ActiveX, Java and JavaScript, these should,<br />

as a general rule, be deactivated.<br />

If ActiveX, Java and JavaScript absolutely must be used, they should only be<br />

allocated to computers separated from other internal computers in such a way<br />

that security-relevant data cannot be impaired.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!