19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> of Generic Components<br />

_________________________________________________________________________________________<br />

7.6 Remote Access<br />

In order for a user to be able to access a remote computer network from his local computer,<br />

appropriate remote access services must be established. This module explains how to protect the<br />

individual RAS system components and draw up a corresponding RAS security concept.<br />

8.1 Telecommunications System (Private Branch Exchange, PBX)<br />

This module considers private branch exchanges (PBX) based on ISDN. A PBX is typically a complex<br />

<strong>IT</strong> system whose administration requires a number of safeguards if it is to operate securely.<br />

8.2 Fax Machine<br />

<strong>The</strong> transmission of information over a stand-alone fax machine opens up a new area of threats. <strong>The</strong><br />

safeguards required to ensure <strong>IT</strong> baseline protection when using fax machines are described. <strong>The</strong>se<br />

include the disposal of fax consumables, the appropriate positioning of the fax machine and, if<br />

appropriate, any communication between sender and receiver.<br />

8.3 Answering Machine<br />

Modern answering machines with remote access capabilities can be thought of as <strong>IT</strong> systems which<br />

store speech information. <strong>The</strong>y are at risk from abuse of the remote replay facility. <strong>IT</strong> baseline<br />

protection measures for answering machines are described, also specifically in regard to this threat.<br />

8.4 LAN connection of an <strong>IT</strong> system via ISDN<br />

This module considers the integration of an <strong>IT</strong> system into a remote LAN by means of an ISDN<br />

adapter card with S0-interface. It is assumed that this LAN contains a router which is connected to the<br />

public telephone network via an S2M-interface.<br />

8.5 Fax Servers<br />

This module concentrates on fax transmissions using a fax server. A fax server in this sense is an<br />

application which is installed on an <strong>IT</strong> system and provides services on a network enabling other <strong>IT</strong><br />

systems to send and/or receive faxes.<br />

8.6 Mobile Telephones<br />

This section presents a set of security safeguards for the components mobile phone, base station and<br />

fixed network and their mutual interaction, which are aimed at ensuring that use of digital mobile<br />

telephone systems based on the GSM standard (D and E networks) is secure.<br />

9.1 Standard Software<br />

A procedure is described as to how the life cycle of standard software can be structured, i.e.<br />

requirements catalogue, selection, testing, approval, installation and deinstallation. Aspects such as<br />

functionality tests and security characteristics, installation instructions and the approval process are<br />

described.<br />

9.2 Databases<br />

Safeguards relating to the selection, installation, configuration and ongoing operation of a database<br />

system are described. <strong>The</strong>se include the development of a database concept, provisions for the creation<br />

of database users and user groups, and guidelines for database queries.<br />

9.3 Telecommuting<br />

<strong>The</strong> procedures for installing telecommuting workstations are described from an organisational and<br />

personnel point of view. <strong>The</strong> security-relevant requirements for telecommuting which need to be<br />

implemented through the use of suitable <strong>IT</strong> components are described.<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!