19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Networked Systems<br />

_________________________________________________________________________________________<br />

- T 5.5 Vandalism<br />

- T 5.6 Attack<br />

- T 5.7 Line tapping<br />

- T 5.8 Manipulation of lines<br />

- T 5.9 Unauthorised use of <strong>IT</strong> systems<br />

- T 5.18 Systematic trying-out of passwords<br />

- T 5.28 Denial of services<br />

- T 5.66 Unauthorised connection of <strong>IT</strong> systems to a network<br />

- T 5.67 Unauthorised execution of network management functions<br />

- T 5.68 Unauthorised access to active network components<br />

Recommended Countermeasures (S)<br />

To implement <strong>IT</strong> baseline protection, selection of the required packages of safeguards ("modules"), as<br />

described in Sections 2.3 and 2.4, is recommended.<br />

Here, it must be pointed out once again that adequate protection of a LAN from the perspective of <strong>IT</strong><br />

baseline protection can only be ensured if the packages of safeguards described in Chapter 4.2<br />

Cabling, Chapter 6.1 Server-based networks and, if applicable, additional measures related to the<br />

operating-system in use and Chapter 6.8 Network and system management are also implemented.<br />

Furthermore, the active network components should be installed in rooms intended to accommodate<br />

technical infrastructure (e.g. distributor rooms), this means that the safeguards described in Chapter<br />

4.3.4 Technical infrastructure rooms also need to be taken into account.<br />

<strong>The</strong> network administrator's workstation also requires special protection. In addition to the safeguards<br />

described in Chapter 4.3.1 Offices, rules pertaining to the operating system in use must also be<br />

specified here (refer to Chapter 6).<br />

Secure operation of a heterogeneous network requires the implementation of a number of measures,<br />

beginning with an analysis of the existing network environment, followed by the development of a<br />

network management concept, and leading to the actual operation of a heterogeneous network. <strong>The</strong><br />

steps and measures involved are described below:<br />

1. Analysis of the existing network environment (refer to S 2.139 Survey of the existing network<br />

environment and S 2.140 Analysis of the existing network environment)<br />

- Survey of load factors and analysis of traffic flow<br />

- Determination of network bottlenecks<br />

- Identification of critical areas<br />

2. Conception<br />

- Conception of a network (refer to S 2.141 Development of a network concept, S 2.142<br />

Development of a network realisation plan and S 5.60 Selection of a suitable backbone<br />

technology)<br />

- Conception of a network management (refer to S 2.143 Development of a network<br />

management concept and S 2.144 Selection of a suitable network management protocol)<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!