19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Networked Systems Peer-to-Peer Network<br />

_________________________________________________________________________________________<br />

6.3 Peer-to-Peer network<br />

Description<br />

Here, networked PCs are considered which are operated with<br />

Windows for Workgroups (WfW), Windows 95 or Windows Peer-to-Peer<br />

NT. Only the pure Peer-to-Peer functions of these operating<br />

systems are taken into consideration on the basis of resourcesharing<br />

(printer, hard disk). Only brief attention is paid to<br />

security-specific aspects of single applications when using<br />

Peer-to-Peer functions, e.g. Mail Exchange, Schedule+,<br />

Direct Data Exchange (DDE) or Remote Access Service (RAS).<br />

Since Peer-to-Peer networks offer considerably less security functions than server-supported networks,<br />

the use of Peer-to-Peer functions within a server-supported network should be avoided. Peer-to-Peer<br />

networks with a connection via WfW to another computer with WfW, Windows 95 or Windows NT<br />

should only be considered as a transitional solution until WfW has been replaced.<br />

This chapter deals solely with the threats and safeguards specific to a Peer-to-Peer network. <strong>The</strong><br />

threats and safeguards contained in the PC-specific units of Chapter 5 should thus also be observed.<br />

Threat Scenario<br />

<strong>The</strong> following typical threats (T) are assumed as regards Peer-to-Peer functions under Windows for<br />

Workgroups, Windows 95 or Windows NT:<br />

Organisational shortcomings:<br />

- T 2.25 Reduction of transmission or execution speed caused by Peer-to-Peer functions<br />

Human Failure:<br />

- T 3.9 Improper <strong>IT</strong> system administration<br />

- T 3.18 Sharing of directories, printers or of the clipboard<br />

- T 3.19 Storing of passwords for WfW and Windows 95<br />

- T 3.20 Unintentional granting of read access for Schedule+<br />

Deliberate Acts:<br />

- T 5.45 Trying Out Passwords under WfW and Windows 95<br />

- T 5.46 Masquerading under WfW<br />

- T 5.47 Deleting the Post Office<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!