19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Telecommunications LAN connection of an <strong>IT</strong> system via ISDN<br />

_________________________________________________________________________________________<br />

- T 5.39 Infiltrating computer systems via communication cards<br />

- T 5.48 IP Spoofing<br />

- T 5.61 Misuse of remote access to management functions on routers<br />

- T 5.62 Misuse of resources via remote <strong>IT</strong> systems<br />

- T 5.63 Manipulation via the ISDN D-channel<br />

Recommended Countermeasures (S)<br />

To implement <strong>IT</strong> baseline protection, selection of the required packages of safeguards ("modules"), as<br />

described in Sections 2.3 and 2.4, is recommended.<br />

<strong>The</strong> safeguard package for integration of an <strong>IT</strong> system into a LAN via ISDN is described in the<br />

following. <strong>The</strong> primary objective in this context is to ensure reliable communications. Further<br />

safeguards required for the communicating <strong>IT</strong> systems are specified in the related chapters (refer to<br />

Chapter 6 for routers, and Chapter 5 for remote <strong>IT</strong> systems).<br />

<strong>The</strong> following measures are additionally recommended:<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!