19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.154 Creation of a computer virus protection<br />

concept<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: <strong>IT</strong> Security Management<br />

In order to obtain effective protection against computer viruses for an entire<br />

organisation, it is essential to select and implement co-ordinated and<br />

appropriate protective measures. This calls for a conceptual approach to<br />

ensure that suitable measures are applied to all <strong>IT</strong> systems concerned and that<br />

the necessary protection is maintained by a programme of updating.<br />

<strong>The</strong> table of contents of a computer virus protection concept is shown below.<br />

Table of contents of a computer virus protection concept<br />

Part A: Awareness raising<br />

1 Dependence of the institution on the use of <strong>IT</strong><br />

2 Description of the hazard potential<br />

2.1 Computer viruses<br />

2.2 Macro viruses<br />

2.3 Trojan horses<br />

2.4 Hoaxes<br />

3 Damage scenarios<br />

4 <strong>IT</strong> systems potentially affected<br />

Part B: Necessary protective measures<br />

5 Computer virus protection strategy<br />

5.1 Non-networked <strong>IT</strong> systems<br />

5.2 Networked terminals<br />

5.3 Servers<br />

6 Updating computer virus scanning programs<br />

6.1 Non-networked <strong>IT</strong> systems<br />

6.2 Networked terminals<br />

6.3 Servers<br />

Part C: Regulations<br />

7 Regulations on protection against computer viruses<br />

7.1 Ban on using non-approved software<br />

7.2 Training of <strong>IT</strong> users<br />

7.3 Rearranging the boot sequence<br />

7.4 Creating an emergency floppy disk<br />

7.5 Procedures in the event of computer virus infection<br />

7.6 Measures for <strong>IT</strong> systems with non-resident virus-checking<br />

7.6.1 Periodic running of a computer virus detection program<br />

7.6.2 Virus checking on exchange of data media and during data<br />

transmission<br />

7.6.3 Checking of incoming files for macro viruses<br />

8 Regulation of responsibilities<br />

8.1 Who to contact in relation to computer viruses<br />

8.2 Responsibility of administrators<br />

8.3 Responsibility of individual <strong>IT</strong> users<br />

8.4 Responsibility of <strong>IT</strong> security management<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!