19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.2 Resource management<br />

Initiation responsibility: Agency/company management<br />

Implementation responsibility: Head of <strong>IT</strong> Section, Head of organisation<br />

Resources (or non-monetary resources) for <strong>IT</strong> uses are all necessary articles<br />

such as hardware components (computer, keyboard, printer, etc.), software<br />

(system software, individual programs, standard programs, and the like),<br />

consumables (paper, toner, printer cartridges), data media (magnetic tapes,<br />

floppy disks, streamer tapes, hard disks, removable hard disks, CD ROMs, and<br />

the like).<br />

Resource management comprises the following tasks:<br />

- procurement of resources,<br />

- pre-use testing;<br />

- marking and<br />

- inventorising,<br />

Procurement of resources is of particular importance in the use of<br />

information technology systems. A well-regulated procurement procedure<br />

will, in particular, support the objectives to be achieved with the use of<br />

information technology: improved performance, economic efficiency,<br />

improvement of communication possibilities.<br />

Apart from mere economy aspects, a regulated procurement procedure - which<br />

can also be handled centrally - can also provide for greater account being<br />

taken of new developments and of improvements in the area of information<br />

technology.<br />

Moreover, central procurement will ensure the introduction and observance of<br />

an "in-house standard", which simplifies the training of the staff and<br />

maintenance activities.<br />

With a regulated test procedure before the use of resources, various threats<br />

can be averted. Examples are:<br />

- verifying the completeness of deliveries (e.g. manuals) in order to ensure<br />

the availability of all components to be delivered;<br />

- testing of new PC software and of new pre-formatted data media by means<br />

of a computer virus detection program;<br />

- test runs of new software on specific test systems;<br />

- verification of the compatibility of new hardware and software components<br />

with existing components.<br />

It is only by means of an inventory of the resources used that consumption<br />

requirements can be determined, and replenishment orders be placed.<br />

Moreover, inventorising makes it possible to carry out checks for<br />

completeness, to check the use of non-approved software or to detect<br />

purloining of resources. This calls for clear marking of the most important<br />

resources with distinct identification features (e.g. grouped serial inventory<br />

numbers). In addition, the serial numbers of existing devices such as monitors,<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!