19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

S 6.34 Determining the factors influencing data<br />

backup<br />

Initiation responsibility: <strong>IT</strong> Security Management<br />

Implementation responsibility: Administrator; staff responsible for the<br />

individual <strong>IT</strong> applications<br />

<strong>The</strong> following influential factors must be determined for each <strong>IT</strong> system,<br />

possibly even for each individual <strong>IT</strong> application of particular significance. <strong>The</strong><br />

system administrators and persons-in-charge of the various <strong>IT</strong> applications can<br />

be interviewed for this purpose. <strong>The</strong> results are to be comprehensibly<br />

documented.<br />

<strong>The</strong> following theoretical example is to demonstrate how the influential<br />

factors can be determined in practice. This example involves a server-based<br />

LAN with 10 PC's connected as workstations. <strong>The</strong> <strong>IT</strong> system is used for<br />

processing orders with the help of a database. <strong>The</strong> application data are stored<br />

centrally on the network server.<br />

<strong>The</strong> following individual items need to be established:<br />

Specifying the data to be backed up<br />

<strong>The</strong> data stock of the <strong>IT</strong> system (<strong>IT</strong> application) required to perform the<br />

specialised task must be determined. This includes the application and<br />

operational software, system data (e.g. initialisation files, macro definitions,<br />

configuration data, text blocks, password files, access-right files), the<br />

application data as such and the protocol data (log-ins, security violations,<br />

data transmissions).<br />

Sample result 1: Specifying the data to be backed up<br />

<strong>IT</strong> system: Server-based LAN with 10 connected PC's<br />

Data to be backed-up:<br />

- Software: Network operating system, PC operating systems, word<br />

processing software, database software etc. in the form of standard<br />

software<br />

- System data:<br />

On the network server: System-internal settings (e.g. authorisation<br />

structure, passwords)<br />

On the PC's: Initialisation data of the word processing and database<br />

software, macro definitions and text blocks<br />

- Application data on the network server: Files of written<br />

correspondence, customer database<br />

- Protocol data on the network server: Logs of network activities<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!