19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

Password protection:<br />

- Are there passwords which have been pre-set by the manufacturer? Typical<br />

examples of such passwords are the product name, the manufacturer’s<br />

name, ”SUPERVISOR”, ”ADMINISTRATOR”, ”USER”, ”GUEST”.<br />

- Which file changes if a password was changed? Can this file be replaced<br />

by an old version from a backup to activate old passwords? Are the<br />

passwords stored in encrypted form or are they readable in plain text? Is it<br />

possible to make changes in this file to activate new passwords?<br />

- Is access actually blocked following several incorrect password entries?<br />

- Are programs offered in magazines or mailboxes which can determine the<br />

passwords of the product being examined? Such programs are available for<br />

some standard applications.<br />

- If files are protected by passwords, can the position at which the password<br />

is stored be determined by a comparison of a file before and after the<br />

change in the password? Is it possible to enter changes or old values at this<br />

point in order to activate known passwords? Are the passwords stored in<br />

encrypted form? How is the position allocated if password protection is<br />

deactivated?<br />

- Can the password testing routine be interrupted? Are there key<br />

combinations with which password entry can be bypassed?<br />

Access rights:<br />

- In which files are access rights stored and how are they protected?<br />

- Can access rights be altered by unauthorised persons?<br />

- Can files be inserted using old access rights and which rights are needed<br />

for this?<br />

- Can the rights of the administrator be restricted such that he does not<br />

obtain access to the usage- or protocol data?<br />

Data backup:<br />

- Can backups which have been created be reconstructed without difficulty?<br />

- Can backups be protected by a password? If so, can the password trial<br />

attempts described above be used?<br />

Encryption:<br />

- Does the product offer the possibility of encrypting files or backups?<br />

- Are several different encryption algorithms offered? In this connection,<br />

generally speaking, the following rule of thumb should be observed: ”<strong>The</strong><br />

quicker an encryption algorithm produced in software is, the more insecure<br />

it is.”<br />

- Where are the keys used for encryption and decryption stored?<br />

In the case of local storage there must be an examination of whether these<br />

keys are password-protected or are protected by a second encryption with a<br />

further key. In the case of password protection the above points must be<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!