19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

happen, for instance, if users fail to use different SNMP passwords (community<br />

strings)), then the uncoordinated setting of configuration parameters may lead<br />

to gaps in the security.<br />

On the other hand, if components (such as printers) are used by two<br />

administrative areas together and if, for example, the confidentiality of the<br />

other administrative area (e.g. Windows NT network releases) was not set up<br />

correctly, this can inadvertently lead to security problems if an unauthorised<br />

third person is permitted access.<br />

Non-integrated administrative software<br />

In the administration of medium and large systems, after the management<br />

system has been introduced, it may be the case that new components are to be<br />

integrated into the system whose administration requires functions which the<br />

management system in use does not support. This applies in particular to the<br />

area of application management. If administrative software that cannot be<br />

integrated into the management system is used for the administration of the<br />

new components (e.g. via a programming interface or through the<br />

implementation of what are known as gateways), then it is impossible to<br />

integrate the components into the management system. Thus the new<br />

components are not subject to the "automatic" management, making it<br />

necessary to manage them "manually". <strong>The</strong> strategy laid down for the<br />

management must now be applied to two systems. However, this can lead to<br />

configuration errors which can cause gaps in the security.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!