19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Data Transmission Systems Firewall<br />

_________________________________________________________________________________________<br />

Organisational shortcomings:<br />

- T 2.24 Loss of confidentiality of sensitive data of the network to be protected<br />

Human Failure:<br />

- T 3.3 Non-compliance with <strong>IT</strong> security measures<br />

- T 3.9 Improper <strong>IT</strong> system administration<br />

- T 3.38 Errors in configuration and operation<br />

Technical Failure:<br />

- T 4.8 Discovery of software vulnerabilities<br />

- T 4.10 Complexity of access possibilities to networked <strong>IT</strong> systems<br />

- T 4.11 Lack of authentication possibilities between NIS Server and NIS Client<br />

- T 4.12 Lack of authentication possibilities between X Server and X Client<br />

- T 4.20 Data loss due to exhausting storage medium<br />

- T 4.22 Vulnerabilities or errors in standard software<br />

- T 4.39 Software conception errors<br />

Deliberate Acts:<br />

- T 5.2 Manipulation of data or software<br />

- T 5.9 Unauthorised use of <strong>IT</strong> systems<br />

- T 5.18 Systematic trying-out of passwords<br />

- T 5.24 Replay of messages<br />

- T 5.25 Masquerade<br />

- T 5.28 Denial of services<br />

- T 5.39 Infiltrating computer systems via communication cards<br />

- T 5.48 IP spoofing<br />

- T 5.49 Abuse of Source Routing<br />

- T 5.50 Abuse of the ICMP Protocol<br />

- T 5.51 Abuse of Routing Protocols<br />

- T 5.78 DNS spoofing<br />

Recommended Countermeasures (S)<br />

For the implementation of <strong>IT</strong> baseline protection, selection of the required packages of safeguards<br />

("modules") as described in chapters 2.3 and 2.4, is recommended.<br />

A firewall protects the internal network against attacks from outside. In order to protect the internal<br />

network against attacks from inside, all necessary safeguards should also be taken even when a<br />

firewall is in place. If the internal network is a UNIX or a PC network, for example, the safeguards<br />

described in Chapter 6.1 and 6.2 should also be implemented.<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!