19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

S 6.31 Procedural patterns following a loss of system integrity<br />

S 6.32 Regular data backup<br />

S 6.33 Development of a data backup policy<br />

S 6.34 Determining the factors influencing data backup<br />

S 6.35 Stipulating data backup procedures<br />

S 6.36 Stipulating a minimal data backup policy<br />

S 6.37 Documenting data backup procedures<br />

S 6.38 Back-up copies of transferred data<br />

S 6.39 Listing dealerships for re-procurement of fax products<br />

S 6.40 Regular battery checks/replacements<br />

S 6.41 Training data reconstruction<br />

S 6.42 Creating start-up disks for Windows NT<br />

S 6.43 Use of redundant Windows NT servers<br />

S 6.44 Data back-up under Windows NT<br />

S 6.45 Data backup under Windows 95<br />

S 6.46 Creating a start-up disk for Windows 95<br />

S 6.47 Storage of backup copies as part of telecommuting<br />

S 6.48 Procedures in case of a loss of database integrity<br />

S 6.49 Data backup in a database<br />

S 6.50 Archiving database<br />

S 6.51 Restoring a database<br />

S 6.52 Regular backup of configuration data of active network<br />

components<br />

S 6.53 Redundant arrangement of network components<br />

S 6.54 Procedures in case of a loss of network integrity<br />

S 6.55 Reduction of restart times for Novell Netware servers<br />

S 6.56 Data backup when using cryptographic procedures<br />

S 6.57 Creation of an emergency plan for the failure of the<br />

management system<br />

S 6.58 Establishment of a management system for handling<br />

security incidents<br />

S 6.59 Specification of responsibilities for dealing with<br />

security incidents<br />

S 6.60 Procedural rules and reporting channels for security<br />

incidents<br />

S 6.61 Escalation strategy for security incidents<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!