19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Networked Systems Windows NT Network<br />

_________________________________________________________________________________________<br />

6.4 Windows NT network<br />

Description<br />

This chapter concerns a Windows NT network functioning as<br />

a client-server system under the Windows NT operating<br />

system (version 3.51 or 4.0). <strong>The</strong> security aspects of a<br />

Windows NT server are dealt with.<br />

<strong>The</strong> client-specific safeguards are covered in chapter 5. <strong>The</strong>re<br />

are only marginal references to aspects of Windows NT<br />

applications specific to security, for example in relation to<br />

Mail, Schedule+, Direct-Data-Exchange (DDE) or Remote Access Service (RAS). In addition to the<br />

dangers and protection safeguards detailed here, the safeguards specified in Section 6.1 for a general<br />

server-supported network still apply. If the Peer-to-Peer functionality of Windows NT is used in the<br />

Windows NT network, the contents of Section 6.3 should also be taken into account.<br />

Threat Scenario<br />

<strong>The</strong> following typical threats are assumed for <strong>IT</strong> baseline protection of a server-supported network<br />

under the Windows NT operating system:<br />

Organisational shortcomings:<br />

- T 2.23 Security flaws involved in integrating DOS PCs into a server-based network<br />

- T 2.25 Reduction of transmission or execution speed caused by Peer-to-Peer functions<br />

- T 2.30 Inadequate domain planning<br />

- T 2.31 Inadequate protection of the Windows NT system<br />

Technical Failure:<br />

- T 4.10 Complexity of access possibilities to networked <strong>IT</strong> systems<br />

- T 4.23 Automatic CD-ROM-recognition<br />

Deliberate Acts:<br />

- T 5.23 Computer viruses<br />

- T 5.40 Monitoring rooms using computers equipped with microphones<br />

- T 5.43 Macro viruses<br />

- T 5.52 Misuse of administrator rights in Windows NT systems<br />

- T 5.79 Unauthorised acquisition of administrator rights under Windows NT<br />

Recommended Countermeasures (S)<br />

For the implementation of <strong>IT</strong> baseline protection, selection of the required packages of safeguards<br />

("modules") as described in chapters 2.3 and 2.4, is recommended.<br />

When processing the specific Windows NT safeguards, a safety strategy should first be drawn up<br />

using safeguard S 2.91 Determining a security strategy for the Windows NT client-server network. In<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000<br />

Windows<br />

NT<br />

Netz

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!