19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

addition, even where resident virus scanning programs are used it should be<br />

possible to activate a program on a case-by-case basis on every client as the<br />

need arises, for example to check e-mail attachments selectively before they<br />

are opened.<br />

Advantages:<br />

- An appropriate, up-to-date and resident computer virus scanning program<br />

ensures maximum protection while at the same time minimising effort and<br />

complexity for the <strong>IT</strong> user.<br />

Disadvantages:<br />

- Procurement costs and administration work are applicable to every<br />

terminal.<br />

- Older <strong>IT</strong> systems may not have sufficient main memory. <strong>The</strong>re may also be<br />

complications with regard to interoperation with other programs.<br />

Computer virus scanning programs on all terminals with external<br />

interfaces<br />

In networked <strong>IT</strong> systems a resident computer virus scanning program is only<br />

installed on those <strong>IT</strong> systems which in addition to interfaces to their own<br />

internal network also have other external interfaces (floppy disk drive, CD-<br />

ROM, modem). Networked <strong>IT</strong> systems without direct external interfaces are<br />

not equipped with computer virus scanning programs.<br />

Advantages:<br />

- Procurement costs and administration work are limited to those <strong>IT</strong> systems<br />

with external interfaces.<br />

Disadvantages:<br />

- Changes to the <strong>IT</strong> systems which result in the setting up of new external<br />

interfaces must be painstakingly followed up because it may become<br />

necessary to retrofit <strong>IT</strong> systems with computer virus scanning programs.<br />

- Encrypted files or programs which contain computer viruses and which are<br />

not decrypted until they are on an unprotected terminal will cause<br />

infections. This may also be true of compressed files in the same way, if<br />

the scanning program is not suitable.<br />

Computer virus scanning programs on all servers<br />

In this case every server in a networked <strong>IT</strong> system is equipped with a resident<br />

computer virus scanning program, but the terminals connected to the server<br />

are not. This ensures that it is impossible for computer viruses to be<br />

transferred from one terminal to another, and that therefore a possible<br />

infection remains locally isolated.<br />

Advantages:<br />

- Procurement costs and administration work are restricted to the servers.<br />

- Protecting the servers prevents re-infections, for example after archived<br />

files are retrieved.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!