19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

gateway, because in these circumstances active content can no longer cause<br />

any harm in the internal network.<br />

Another solution is to allow only certain WWW browsers to be used for<br />

access to the Internet. Netscape Communicator and Internet Explorer are not<br />

the only browsers available; there are also other browsers that have no means<br />

of executing active content.<br />

One option is to ensure that browsers of this type will be used by setting up<br />

the administration of the workstations to this effect. In this case, however, the<br />

operating systems of the workstation must provide reliable separation of roles<br />

between users and administrators, such that configurations set by the<br />

administrator cannot be revoked by a user. Additional security precautions are<br />

therefore necessary with operating systems such as Windows 3.1 and<br />

Windows 95.<br />

Alternatively, the proxy on the firewall could be set up in such a way that only<br />

predefined browser software is allowed access to the Internet. It must be borne<br />

in mind in this case, however, that the security of this method is dependent on<br />

the ID of the WWW browser used. A skilled user with a hex editor should<br />

have no difficulty modifying a WWW browser of his choice in such a way<br />

that it has the desired ID.<br />

Raising the awareness of users<br />

It is also conceivable to place the responsibility entirely in the hands of the<br />

users. Active content should normally be deactivated in the WWW browser,<br />

but the users have permission to run active content in certain circumstances.<br />

This could be the case for example if they were no longer able to access the<br />

WWW information provided by a well-known manufacturer without running<br />

the active content.<br />

ActiveX, in particular, has various security settings, which enable the<br />

execution of ActiveX to be restricted to certain WWW servers so that users<br />

are not forced to change their settings repeatedly.<br />

<strong>The</strong>re must be some doubt, however, whether users will really always change<br />

the security settings of their WWW browsers when they switch to another<br />

WWW page, for example where a link from the "well-known manufacturer"<br />

may have taken them. Besides, an individual Web page on a "secure"<br />

computer can also load other Web pages which are located on "non-secure"<br />

computers. As well as that, attacks can be made on the Internet which have the<br />

effect that users do not receive the WWW page that they requested (see T 5.48<br />

IP spoofing and T 5.78 DNS spoofing, for example).<br />

Filtering specific active content<br />

Recently programs have been developed which work in a similar way to<br />

computer virus scanning programs by examining active content to determine<br />

whether it contains code that is a threat to security. This is a highly acceptable<br />

solution for users, because they can then access all harmless active content.<br />

<strong>The</strong> question has to be asked, though, whether such programs really provide<br />

protection. A virus scanning program cannot provide protection against Trojan<br />

horses, for example, and these can of course cause considerable damage.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!