19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Other <strong>IT</strong> Components Telecommuting<br />

_________________________________________________________________________________________<br />

9.3 Telecommuting<br />

Description<br />

In general, telecommuting comprises activities which are<br />

performed from a remote location for an employer or client<br />

with the help of communications links to that employer or<br />

client.<br />

<strong>The</strong>re are different types of telecommuting, such as working<br />

at satellite offices, neighbourhood offices, mobile<br />

telecommuting, and working at one's own residence. In the<br />

last case, a distinction is made between exclusive telecommuting and alternate telecommuting, i.e.<br />

working exclusively at home, or partly at home and partly at an institution.<br />

This chapter deals with the types of telecommuting performed partly or exclusively at home. It is<br />

assumed that the home workstation and institution are linked by means of a telecommunications line<br />

allowing an exchange of data and, if required, access to data at the institution.<br />

<strong>The</strong> measures recommended in this chapter fall under four different categories:<br />

- Organisation of telecommuting<br />

- Remote computer used by the telecommuter<br />

- Communications link between the remote computer and institution<br />

- Computer at the institution used for communication with the remote computer<br />

<strong>The</strong> safeguards recommended in this chapter concentrate on additional security requirements for <strong>IT</strong><br />

systems used for telecommuting. In particular, security requirements are formulated for the technical<br />

components of telecommuting (remote computers, communications links and communications<br />

computers); these requirements must be met by appropriately configured <strong>IT</strong> systems. <strong>The</strong> related<br />

modules in Chapter 5 and the safeguards for the home working-place mentioned in Chapter 4.5 also<br />

need to be considered for the <strong>IT</strong> systems used.<br />

Threat Scenario<br />

<strong>The</strong> following typical threats are assumed as regards <strong>IT</strong> baseline protection of telecommuting:<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!