19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue Infrastucture Remarks<br />

____________________________________________________________________ .........................................<br />

S 1.46 Use of anti-theft devices<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Head of <strong>IT</strong> Section<br />

Anti-theft devices should be used wherever valuable items need to be<br />

protected or where other safeguards, such as appropriate control of access to<br />

the workstations, cannot be implemented. Anti-theft devices are useful in<br />

places to which the public have access or where the fluctuation of users is<br />

extremely high.<br />

Not only the object to be protected, but also the monitor, keyboard and other<br />

accessories should be fitted with anti-theft devices.<br />

<strong>The</strong>re are now various types of anti-theft devices available on the market. On<br />

the one hand, there are anti-theft devices for hardware which protect <strong>IT</strong><br />

equipment, for example by connecting the <strong>IT</strong> system to the desk. <strong>The</strong>re are<br />

also a number of security mechanisms to prevent thieves from opening the<br />

casing and stealing components or manipulating security-related settings, for<br />

example by removing security cards.<br />

When new <strong>IT</strong> equipment is procured, it should be ensured that it has eyes on<br />

the casing, so that it can be attached to other objects, and that the casing can<br />

be locked.<br />

Additional Controls:<br />

- Have <strong>IT</strong> systems or <strong>IT</strong> components been stolen within the last year?<br />

- How are <strong>IT</strong> systems or <strong>IT</strong> components protected against theft?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!