19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

mission rates should be used for large quantities of data. Transmission rates<br />

of more than 2400 bits/sec. make tapping more difficult.<br />

A check must subsequently be made as to whether the interface of the <strong>IT</strong><br />

system intended for connection to the modem allows operation at speeds<br />

above 9600 bits/sec.<br />

When selecting the modem, it should be ensured that performance<br />

characteristics, which are of importance for the transmission rate actually<br />

attained, are standardised. <strong>The</strong>se are standards for the transmission rate,<br />

such as V.32bis for 14400 bits/sec. and protocols for transmission<br />

optimisation using data compression and error correction, such as MNP 5<br />

or V.24bis.<br />

- Instruction set<br />

Most modems today use the manufacturer-dependent Hayes-standard (also<br />

termed AT standard). <strong>The</strong> widespread application of this standard allows<br />

largely error-free communication between compatible modems. When<br />

purchasing modems of the latest generation, it should be noted that the<br />

promised high transmission rates can often only be achieved if machines<br />

from the same manufacturer are used on both sides.<br />

- <strong>Manual</strong><br />

A detailed and clearly-written manual is important for rapid installation<br />

and the best possible configuration of a modem.<br />

- Security mechanisms<br />

Modems can incorporate a large variety of security features, e.g. password<br />

mechanisms and call-back functions. Some modems even offer the<br />

possibility of encrypting data intended for transmission.<br />

<strong>The</strong> purchase of a modem with an encryption option is advisable if large<br />

quantities of data need to be transmitted within an organisation with<br />

scattered premises. This on-line coding requires less organisational effort<br />

than the encryption of data by means of auxiliary products. General<br />

statements on the security of the algorithms used are not possible. For <strong>IT</strong><br />

baseline protection, the DES algorithm offers a sufficient degree of<br />

security given an appropriate key management.<br />

As regards security, the widely offered call-back function is advantageous<br />

in that it easily allows unauthorised callers to be repudiated (also refer to S<br />

5.30 Activating an existing call-back option).<br />

Additional controls:<br />

- Are <strong>IT</strong> users and the purchasing department aware of these instructions?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!