19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.59 Procurement of a suitable modem<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: <strong>IT</strong> users, Administrator, Purchasing<br />

<strong>The</strong> following items are to be observed for the purchase of a modem:<br />

- Modem approval<br />

Modems intended for connection to the public telecommunications<br />

network in the Federal Republic of Germany require authorisation by the<br />

Federal Post. Note: Contrary to information in many modem manuals,<br />

commissioning of an approved modem in the Federal Republic of Germany<br />

need no longer be reported to the telephone utility (Telekom).<br />

- Design<br />

An internal modem is advantageous in that its configuration can only be<br />

changed on the computer in which it is integrated. If this computer has<br />

access protection features, they can be used to safeguard the modem<br />

configuration data. At the same time use of the modem can be restricted to<br />

authorised persons. Manipulation of an internal modem is difficult due to<br />

its integration in the computer. In networked systems devoid of such<br />

protective mechanisms (e.g. some Peer-to-Peer networks), internal modems<br />

are disadvantageous due to the possibility of their unregulated operation<br />

from all workplaces.<br />

An external modem can be locked in a safe place after usage. It also offers<br />

the advantage of showing its current-status indication capability via various<br />

displays and the integrated loudspeaker. By means of the loudspeaker, it<br />

can be heard when a connection has been set up from outside or whether an<br />

application is trying to transfer information via the installation and the<br />

system configuration to the manufacturer without being instructed to do so.<br />

A further advantage of an external modem is that it can be switched on<br />

solely for the duration of the data transmission independent of the <strong>IT</strong><br />

system, thus ensuring that the most recent connection has been terminated<br />

and that no connection can be established from outside. A disadvantage of<br />

external modems is the possibility of connecting them to unprotected <strong>IT</strong><br />

systems for the purpose of manipulating the configuration data or reading<br />

out stored passwords.<br />

Due to their size, PCMCIA modems offer the advantage of easy storage<br />

after use. Secure storage prevents them from being connected to<br />

unprotected computers for the purpose of manipulation.<br />

- Transmission rate<br />

<strong>The</strong> higher the transmission rate of a modem, the shorter the transmission<br />

time, and the lower the cost of transmitting large quantities of data with it.<br />

First, the transmission rate required for the application should be<br />

determined. Sufficient values are, for example, 2400 bits/sec. for ASCII<br />

terminal emulation, 9600 bits/sec. for fax transmissions, currently 14400<br />

bits/sec. in the case of Datex-J (T-Online). <strong>The</strong> highest possible trans-<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!