19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.155 Identification of <strong>IT</strong> systems potentially threatened by<br />

computer viruses<br />

S 2.156 Selection of a suitable computer virus protection<br />

strategy<br />

S 2.157 Selection of a suitable computer virus scanning<br />

program<br />

S 2.158 Reporting computer virus infections<br />

S 2.159 Updating the computer virus scanning programs used<br />

S 2.160 Regulations on computer virus protection<br />

S 2.161 Development of a cryptographic concept<br />

S 2.162 Determining the need to use cryptographic procedures<br />

and products<br />

S 2.163 Determining the factors influencing cryptographic<br />

procedures and products<br />

S 2.164 Selection of a suitable cryptographic procedure<br />

S 2.165 Selection of a suitable cryptographic product<br />

S 2.166 Provisions governing the use of crypto modules<br />

S 2.167 Secure deletion of data media<br />

S 2.168 <strong>IT</strong> system analysis before the introduction of a system<br />

management system<br />

S 2.169 Developing a system management strategy<br />

S 2.170 Requirements to be met by a system management<br />

system<br />

S 2.171 Selection of a suitable system management product<br />

S 2.172 Developing a concept for using the WWW<br />

S 2.173 Determining a WWW security strategy<br />

S 2.174 Secure operation of a WWW server<br />

S 2.175 Setting up a WWW server<br />

S 2.176 Selection of a suitable Internet service provider<br />

S 2.177 Security during relocation<br />

S 2.178 Creation of security guidelines for the use of faxes<br />

S 2.179 Procedures controlling the use of fax servers<br />

S 2.180 Configuration of a fax mail centre<br />

S 2.181 Selection of a suitable fax server<br />

S 2.182 Regular revision of <strong>IT</strong> security measures<br />

S 2.183 Performing a RAS requirements analysis<br />

S 2.184 Development of a RAS concept<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!