19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

addition, senders of e-mail are in most cases able to freely enter the origin of<br />

the e-mail (From:) so that their authenticity can only be verified through<br />

double checking or the use of digital signatures. In case of doubt, the<br />

authenticity of the sender should therefore be verified through a corresponding<br />

check or - better still - through the use of encryption and/or digital signatures.<br />

In principle, the authenticity of sender details should not be taken for granted.<br />

E-mail systems should be checked several times daily to determine whether<br />

new e-mails have arrived. Rules should be drawn up to govern the substitution<br />

of users during their prolonged absence, for example, in order to forward<br />

incoming e-mail to a stand-in.<br />

As in most cases, it is not possible to ascertain which type of e-mail client is<br />

used by a mail recipient and which software / operating systems are used on<br />

the transmission route, users should be instructed to employ 7-bit ASCII<br />

representation for mail bodies as well as attachments. Locally applicable<br />

special characters such as mutated vowels and Greek symbols should therefore<br />

not be included in the message text. In case of doubt, attachments should be<br />

converted into 7-bit ASCII form using uuencode, for example.<br />

All rules and instructions concerning the use of e-mail should be specified in<br />

writing and remain constantly available to employees. An appropriate draft is<br />

provided on the accompanying <strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong> CD-ROM.<br />

Personnel must be briefed before using communications services such as email<br />

in order to avoid incorrect handling and ensure that internal<br />

organisational guidelines are adhered to. In particular, users should be made<br />

aware of possible threats and the related security measures to be observed<br />

during the transmission and reception of e-mail.<br />

To prevent overloading through e-mail, employees should be briefed about the<br />

types of action which should be avoided in this context. <strong>The</strong>y should be<br />

warned against participation in electronic chain-letter mailings as well as<br />

subscription to high volume mailing lists.<br />

Users must be informed that files whose contents might cause offence should<br />

not be dispatched to others, stored on information servers, or requested from<br />

them. Furthermore, users should be instructed to observe the following rules<br />

during the use of communications services:<br />

- Negligent or even intentional interruption of operations in progress should<br />

be avoided at all costs. Actions which should be avoided in particular<br />

include unauthorised attempts to access network services regardless of<br />

their nature, modification of information available via networks,<br />

intervention in the operating environments of other network users, and<br />

forwarding of inadvertently received details on computers and staff<br />

members to third parties.<br />

- <strong>Information</strong> of no public relevance should not be disseminated. <strong>The</strong><br />

overloading of networks through an arbitrary and excessive distribution of<br />

information should be avoided.<br />

- <strong>The</strong> distribution of redundant information should be avoided.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!