19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.156 Selection of a suitable computer virus<br />

protection strategy<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Head of <strong>IT</strong> Section<br />

In order to implement computer virus protection it is necessary to deploy<br />

human and financial resources, which must be in reasonable proportion to the<br />

actual potential threat. Details of the following influencing factors must be<br />

collected for all of the identified <strong>IT</strong> systems potentially threatened by<br />

computer viruses:<br />

- How often does a data transfer that could lead to an infection or the<br />

dissemination of computer viruses take place via the existing interfaces?<br />

- What consequences can be expected in the event of an actual infection if<br />

no protective measures are taken?<br />

- How reliably do the <strong>IT</strong> users perform <strong>IT</strong> security measures which need to<br />

be initiated periodically?<br />

- How much time can the <strong>IT</strong> users be expected to spend on computer virus<br />

protection measures?<br />

Given knowledge of the frequency of computer virus infections derived from<br />

the data collected as described above and from technical publications, and<br />

knowledge of the possible consequential damage, a decision has to be taken in<br />

conjunction with management as to which financial resources have to be made<br />

available for necessary measures and which human resources will be made<br />

available.<br />

Once it is known which financial and human resources are available to<br />

provide protection against computer viruses and which <strong>IT</strong> systems have been<br />

identified as being potentially threatened, strategies for achieving suitable<br />

protection can be chosen.<br />

A number of possible strategies are described in the following.<br />

Computer virus scanning programs on every terminal<br />

<strong>The</strong> use of an up-to-date resident computer virus scanning program (i.e. a<br />

program that runs permanently in the background) in an <strong>IT</strong> system ensures<br />

that an infected program cannot be executed or a file with a macro virus<br />

cannot be loaded. Checking of the interfaces on the terminal is taken care of<br />

by the resident scanning program. This ensures that no viruses are transferred<br />

to the <strong>IT</strong> system. It is not advisable to rely solely on the exclusive use of nonresident<br />

computer virus scanning programs (which are only activated when the<br />

program is explicitly started by the user). <strong>The</strong>re is no significant financial<br />

advantage to be obtained from this nowadays, but the disadvantages on the<br />

part of the <strong>IT</strong> users are considerably increased because they must be relied<br />

upon to activate the program on a regular basis.<br />

If all terminals are equipped with a resident computer virus scanning program,<br />

it can be guaranteed that computer viruses will be identified immediately after<br />

they appear and that they will not be disseminated from the terminal. In<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!