19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

Brief examples:<br />

- Data in the existing data base XYZ must be taken over.<br />

- <strong>The</strong> functions A, B, C must remain in the event of version exchange.<br />

- <strong>The</strong> exchange of data with the UNIX system XYZ must be possible.<br />

- Performance requirements describe the required performance as regards<br />

throughput and running time. <strong>Information</strong> concerning the maximum<br />

permissible processing time should be as precise as possible for the<br />

required functions.<br />

Brief examples:<br />

- <strong>The</strong> maximum response time when carrying out function X must not<br />

exceed 2 seconds.<br />

- <strong>The</strong> encryption rate should be at least 60 KB/sec on a 486 DX 33.<br />

- Other simultaneously conducted process must not be slowed down<br />

by more than 30 % as a result of the product.<br />

- Interoperability requirements, i.e. it must be possible to work together<br />

with other products despite platform limitations.<br />

Brief examples:<br />

- Versions of the word processing program should be available for<br />

Windows, UNIX and Macintosh platforms. It should be possible to<br />

compile documents on one operating system and processes them on<br />

another.<br />

- <strong>The</strong> text processing program must be able to work together with the<br />

mail program used.<br />

- Reliability requirements affect the stability of the products, i.e. the<br />

detection of errors and tolerance, failure and operational security.<br />

Brief examples:<br />

- Incorrect input by the user must be detected and must not cause the<br />

program or system to crash.<br />

- <strong>The</strong> data base must have mechanisms which allow all transactions to<br />

be reconstructed (roll forward) in the event of a crash with<br />

destruction of the data base.<br />

- Conformity with standards. <strong>The</strong>se may be international standards, defacto<br />

standards or internal standards.<br />

Brief examples:<br />

- <strong>The</strong> product must comply with the EU monitor guideline<br />

90/270/EEC.<br />

- <strong>The</strong> implementation of a token ring LAN must be in conformance<br />

with ENV 41110.<br />

- <strong>The</strong> product must be in accordance with the X/Open Standard.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!