19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.119 Regulations concerning the use of e-mail<br />

services<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: <strong>IT</strong>-user<br />

If data are to be exchanged electronically between two or more<br />

communications partners, they must observe the following guidelines to<br />

ensure proper exchange:<br />

- E-mails must bear unique addresses to prevent dispatch to the wrong party.<br />

Within an organisation, address books and distribution lists should be<br />

maintained to ensure that the most commonly used addresses are always<br />

correct. Test messages should be sent to newly configured e-mail addresses<br />

in order to ensure that the data is transferred correctly.<br />

- If e-mail is sent to several recipients, the "CC" option should not be used as<br />

every recipient can then see who else has received the message. Instead,<br />

distribution lists or the "BCC" option should be used. BCC stands for blind<br />

carbon copy and recipients entered here are not told who else has received<br />

the message.<br />

- All e-mails sent to external locations must be appended with a signature<br />

file containing the complete sender address.<br />

- <strong>The</strong> subject of communication must always be indicated, similar to the<br />

mention of subjects in written correspondence.<br />

- Data transmissions which have been completed should be checked for<br />

correctness. <strong>The</strong> recipient should check whether data have been received<br />

properly, and issue a confirmation to the transmitting party.<br />

- A memory-resident virus scanner should be employed for incoming and<br />

outgoing files. Prior to their dispatch, outgoing files should be checked<br />

explicitly for computer viruses.<br />

- If a file has been attached to an e-mail, the following information should<br />

also be submitted to the recipient:<br />

- <strong>The</strong> type of file (e.g. Word Perfect 5.0),<br />

- A brief description of the file contents<br />

- A note that the file has been scanned for computer viruses<br />

- If applicable, the type of compression program (e.g. PKZIP)<br />

- If applicable, the type of encryption software or digital signature<br />

<strong>The</strong> following items should not be indicated:<br />

- Passwords allocated to classified information<br />

- Keys used for encrypting information<br />

In the case of most e-mail systems, information is sent in unencrypted form<br />

via open lines, and might be stored on a number of computers until it reaches<br />

the recipient. <strong>The</strong> information can be easily manipulated during its journey. In<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!