19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

authenticated by the authenticator and the communications link can be<br />

established.<br />

Authentication using this technique should also be repeated several times<br />

while a communications link is in use, in order to prevent intrusions into<br />

active links. This can be triggered by the authenticator at sporadic intervals,<br />

without the need for user intervention.<br />

Additional controls:<br />

- Does the installed ISDN card and communications software allow the use<br />

of authentication protocols such as PAP and CHAP?<br />

- Is use being made of available authentication protocols?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!