19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> of Generic Components<br />

_________________________________________________________________________________________<br />

Introduction<br />

<strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> - the Basis for <strong>IT</strong> Security<br />

In our modern information and communication society,<br />

administrative tasks, both public and in industry, are<br />

increasingly routinely supported by the use of information<br />

technology (<strong>IT</strong>). Numerous work processes are electronically<br />

controlled and large amounts of information are stored in<br />

digital form, electronically processed and transferred on local<br />

and public networks. Many tasks performed within both the<br />

public and private sectors are simply not possible without <strong>IT</strong>, while others can only be partially<br />

performed without <strong>IT</strong>. Consequently many public or private sector organisations are totally reliant on<br />

the correct functioning of their <strong>IT</strong> assets. An organisation can only achieve its objectives if <strong>IT</strong> assets<br />

are used in a proper and secure manner.<br />

<strong>The</strong>re are many ways in which organisations depend on the correct functioning of <strong>IT</strong> resources. <strong>The</strong><br />

financial success and competitiveness of companies is dependent on <strong>IT</strong>, so that ultimately jobs<br />

themselves depend directly on the functioning of <strong>IT</strong> assets. Whole industrial sectors such as banking<br />

and insurance, the car industry and logistics depend critically on <strong>IT</strong> today. At the same time, the wellbeing<br />

of every citizen also depends on <strong>IT</strong>, whether it is a matter of his job, satisfaction of his daily<br />

consumer needs or his digital identity in payment transactions, in communications and increasingly in<br />

e-commerce. As society becomes more dependent on <strong>IT</strong>, so the potential social damage which could<br />

be caused by the failure of <strong>IT</strong> resources increases. As <strong>IT</strong> resources of themselves are not without their<br />

weaknesses, there is justifiably great interest in protecting the data and information processed by <strong>IT</strong><br />

assets and in planning, implementing and monitoring the security of these assets.<br />

<strong>The</strong> potential damage which could result from malfunction or failure of <strong>IT</strong> assets can be assigned to<br />

several categories. <strong>The</strong> most obvious of these is loss of availability: if an <strong>IT</strong> system is out of service,<br />

no money transactions can be carried out, online orders are impossible and production processes grind<br />

to a halt. Another issue frequently discussed is loss of confidentiality of data: every citizen is aware of<br />

the necessity of maintaining the confidentiality of his person-related data, every company knows that<br />

company-confidential data about its sales, marketing, research and development would be of interest<br />

to competitors. Loss of integrity (the corruption or falsification of data) is another issue which can<br />

have major consequences: forged or corrupt data results in incorrect accounting entries, production<br />

processes stop if the wrong or faulty input materials are delivered, while errors in development and<br />

planning data lead to faulty products. For some years now, loss of authenticity, i.e. the attribution of<br />

data to the wrong person, has come to be regarded as another major aspect of the general concern<br />

regarding data integrity. For example, payment instructions or orders could be processed so that they<br />

are charged to a third party, digital declarations of intent that have not been properly protected could<br />

be attributed to the wrong persons, as "digital identities" are falsified or become corrupt.<br />

This dependency on <strong>IT</strong> will only increase further in the future. Developments worthy of particular<br />

mention include the following:<br />

- <strong>IT</strong> penetration. More and more areas are coming to be supported by information technology. For<br />

example, a shift in consumer behaviour towards e-commerce is taking place, car and traffic routing<br />

technology is being perfected with <strong>IT</strong> support, intelligent domestic appliances are looming on the<br />

horizon, and even waste disposal containers fitted with microprocessors are now in use.<br />

- Increasing degree of networking. <strong>IT</strong> systems today no longer function in isolation but are<br />

becoming more and more heavily networked. Networking makes it possible to access shared data<br />

resources and to work closely with people in other parts of the world. This in turn leads not only to<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!