19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

Furthermore, functions must be available which allow losses, additions or<br />

alterations to be detected when transferring data between various<br />

processes, users and objects, and which make it impossible to alter the<br />

supposed or actual origin or destination of the data transmission.<br />

- Reliability<br />

For many products it will be necessary to ensure that time-critical tasks are<br />

carried out at precisely the required point in time, i.e. not earlier and not<br />

later. It is also necessary that tasks which are not time-critical are not<br />

transferred into time-critical tasks. Furthermore, it is necessary for many<br />

products to ensure that access is possible at the relevant moment and that<br />

resources are not unnecessarily called up or withheld.<br />

- Transmission security<br />

This term comprises all functions designed for the protection of data during<br />

transmission via communication channels:<br />

- Authentication<br />

- Access control<br />

- Data confidentiality<br />

- Data integrity<br />

- non-repudiation<br />

Some of these functions are implemented by means of cryptographic<br />

processes.<br />

Further security requirements in addition to <strong>IT</strong>SEC can be placed on standard<br />

software.<br />

- Data backup<br />

Great demands are placed on the availability of data processed with the<br />

product. This includes functions integrated in the product which serve to<br />

prevent data loss, such as the automatic saving feature or the automatic<br />

creation of backups before making major alterations.<br />

- Encryption<br />

Encryption serves as a preserver of data confidentiality. For many products<br />

it will be necessary to encrypt data before transmission or after processing<br />

and to decrypt information after receipt or before rerouting. An accepted<br />

encryption algorithm should be used for this purpose. It should be ensured<br />

that the parameters required for decrypting (e.g. key) are protected in such<br />

a way that unauthorised access to this data is not possible.<br />

- Functions for the preservation of data integrity<br />

In case of data whose loss of integrity could lead to damage, functions can<br />

be used which are able to detect or even correct errors by means of<br />

redundancy. In most cases, integrity tests are used which can reliably<br />

detect intentional manipulation of the product or data and any unauthorised<br />

replay of data. <strong>The</strong>se tests are based on cryptographic mechanisms (see S<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!