19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Data Transmission Systems Modem<br />

_________________________________________________________________________________________<br />

Infrastructure:<br />

- S 1.25 (3) Overvoltage protection (optional)<br />

- S 1.38 (1) Suitable siting of a modem<br />

Organisation:<br />

- S 2.25 (2) Documentation of the System Configuration<br />

- S 2.42 (2) Determination of potential communications partners<br />

- S 2.46 (2) Appropriate key management (optional)<br />

- S 2.59 (1) Procurement of a suitable modem<br />

- S 2.60 (1) Secure administration of a modem<br />

- S 2.61 (2) Requirements document for modem usage<br />

- S 2.204 (1) Prevention of insecure network access<br />

Personnel:<br />

- S 3.17 (1) Briefing personnel on modem usage<br />

Hardware and software:<br />

- S 4.7 (1) Change of preset passwords<br />

- S 4.30 (2) Utilisation of the security functions offered in application programs<br />

- S 4.33 (1) Use of a virus scanning program when exchanging of data media and data<br />

transmission<br />

(for <strong>IT</strong> systems generally prone to computer viruses)<br />

- S 4.34 (2) Using encryption, checksums or digital signatures (optional)<br />

- S 4.44 (2) Checking of incoming files for macro viruses<br />

Communications:<br />

- S 5.30 (1) Activating an existing call-back option<br />

- S 5.31 (1) Suitable modem configuration<br />

- S 5.32 (1) Secure use of communications software<br />

- S 5.33 (1) Secure remote maintenance via modem<br />

- S 5.44 (2) One-way connection setup (optional)<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000<br />

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!