19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 2.45 Conceptual deficiencies of a network<br />

Correct planning of the installation and expansion of a network decisively<br />

determines the success of all network operations. Progressively shorter<br />

innovation cycles in <strong>IT</strong> pose a particular challenge to networks which cannot<br />

meet the new requirements due to their design, and therefore easily create<br />

bottlenecks:<br />

- A network must be designed in accordance with the requirements of<br />

network users (e.g. workgroups) as regards the confidentiality of data and<br />

the integrity of the network. Otherwise, confidential data of a particular<br />

workgroup could be read by other, unauthorised network users. <strong>The</strong><br />

confidentiality of data can also be violated through the relocation of<br />

individual workgroup members or entire workgroups if it is not possible to<br />

configure new confidential domains in the network or reconfigure existing<br />

ones. This threat also applies to the integrity of the network or segments<br />

thereof.<br />

Example: A subnetwork separated by a router was configured for a<br />

workgroup that had special requirements as regards the confidentiality and<br />

integrity of data. Because of the routing of cables this segment was<br />

confined to one single building. If several members of this workgroup were<br />

later relocated to a different building, they would then need to<br />

communicate via the standard, productive network. As a result, the<br />

confidentiality and integrity of the data could no longer be ensured.<br />

- If new applications with higher bandwidth demands than were foreseen<br />

during the planning phase are placed within the network, this can easily<br />

impair the availability of the entire network if conceptual deficiencies in its<br />

infrastructure no longer allow adequate scaling (loss of availability due to<br />

overload). Depending on the existing segmentation of the network, the loss<br />

of availability might only affect individual segments.<br />

Example: For historical reasons, many existing networks which have been<br />

expanded during the course of time contain, in many cases, backbone<br />

segments with a lower maximum bandwidth, such as Token-Ring or<br />

Ethernet segments. <strong>The</strong> restricted transmission rates in these backbone<br />

segments affect the availability of the entire network during periods when<br />

the load is high.<br />

- Networks intended exclusively to connect proprietary systems can also<br />

suffer a loss of availability if they are connected to non suitable systems<br />

(loss of availability due to network components which cannot operate<br />

together).<br />

Example: Proprietary networks are used primarily in the mainframe sector<br />

for connecting mainframes with their terminals. Such networks are often<br />

intended for terminal or printer operation only and are not suitable for other<br />

architectures (e.g. Ethernet). This applies to the installed cables as well as<br />

the active network components. If an attempt is made to exceed this scope,<br />

the proprietary network usually becomes unavailable. One possibility of<br />

integrating two different architectures is to create a connection via a<br />

gateway.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!