19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.68 Implementation of security checks by the<br />

peer-to-peer network users<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: <strong>IT</strong>-user<br />

As the major security measures in a Peer-to-Peer network can only be checked<br />

on a decentralised basis, the users are responsible for implementing security<br />

checks of this kind. <strong>The</strong> following checks should thus be carried out by the<br />

users at appropriate intervals:<br />

- Checking active connections: Using the program Network Monitor (in the<br />

program group NETWORK) under WfW, it is possible to check which<br />

computer currently has access to the user's own computer and what the<br />

nature of this access is. <strong>The</strong> program can be optionally installed in the<br />

program group ACCESSORIES, sub-menu SYSTEM PROGRAMS under<br />

Windows 95, or the control panel option "Server" under Windows NT.<br />

For example:<br />

<strong>The</strong> connections from the computer "MUSTER" are displayed. <strong>The</strong> icons have<br />

the following meaning:<br />

output file<br />

Access for writing purposes to the directory INFOS<br />

Access for reading purposes to the directory TEMP<br />

Access to the printer with the name HP$<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

A connection was created to your output file<br />

Access to the page with the name PAGE12 of your<br />

In the event that unauthorised access by a computer to a directory or the<br />

printer is displayed, share is to be withdrawn. Any pending printing jobs<br />

can be interrupted using the print manager. <strong>The</strong> various actions are<br />

documented in the event protocol (see next illustration). In the event of

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!