19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Other <strong>IT</strong> Components Telecommuting<br />

_________________________________________________________________________________________<br />

From the view of a user, a transaction will either be completed as a whole or not at all. If there is an<br />

error or interruption, all changes made so far will be undone. This is ensured in the DBMS with<br />

appropriate recovery measures.<br />

- Consistency<br />

All integrity conditions in the database are maintained. A transaction leads the database from a<br />

consistent state into another consistent state. This can be ensured by appropriate synchronisation<br />

mechanisms in the database.<br />

- Isolation<br />

Every transaction is isolated from all other transactions. This also implies that a transaction can<br />

access only data that are part of a consistent state of the database.<br />

- Durability<br />

If a transaction has been reported to the user as successfully completed, all changes made in the<br />

database will survive subsequent hardware or software failures (unless the database is destroyed as<br />

a whole).<br />

<strong>The</strong>se requirements are fulfilled by almost all commercially available DBMS systems.<br />

Database systems are based on standard commercial software offered by a variety of manufacturers.<br />

<strong>The</strong> first step in acquiring a database for processing data is to select a suitable standard software<br />

package. <strong>The</strong> related threats and safeguards stated in Chapter 9.1 Standard Software must also be<br />

considered here.<br />

Databases cannot be treated separately from the environment in which they are used. A stand-alone PC<br />

is just as feasible as a mainframe or a network of Unix systems. For this reason, the threats and<br />

safeguards described in Chapter 5 Non-networked systems, Chapter 6 Local Area Networks and<br />

Chapter 7 Data Transfer Systems should be taken into consideration in accordance with the type of<br />

environment involved. To prevent redundancies, this chapter does not repeat descriptions of threats<br />

and safeguards unless they are of particular importance.<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!