19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

- Computer viruses are not disseminated further via servers. <strong>The</strong>y can,<br />

however, be spread on the terminals if files are exchanged between them<br />

directly (for example on floppy disk).<br />

Disadvantages:<br />

- This method is susceptible to error: in some circumstances, e-mail<br />

attachments may not all be recognised. Often scanning programs only<br />

check for the presence of attachments within the first few lines of an e-mail<br />

or in the mail header. It can also happen that the procedure with which the<br />

attachment has been processed (e.g. uuencode) is not supported by the<br />

virus scanning program. This is possible with MIME, for example:<br />

problems may arise if one or more files encoded with uuencode are simply<br />

inserted into the body of the e-mail.<br />

- Detrimental effect on performance, because all communication content has<br />

to be checked.<br />

- Only a minimal operating system should be installed on all communication<br />

servers, in other words only the most essential services (see also S 4.??<br />

Minimal operating system).<br />

- In order to avoid denial-of-service attacks, a computer virus scanning<br />

program should never be installed on a firewall – at most on a proxy, if at<br />

all.<br />

Data hygiene and central checking of files<br />

All incoming and outgoing files and data media are checked at a central point<br />

by a computer virus scanning program. In addition, there is a rule that the <strong>IT</strong><br />

users must not use any files, programs or data media of doubtful origin.<br />

Advantages:<br />

- <strong>The</strong> number of licences for computer virus scanning programs that need to<br />

be purchased is considerably reduced.<br />

Disadvantages:<br />

- If external data media are used frequently, central checking for computer<br />

viruses takes up a great deal of time and delays operational procedures. It is<br />

impossible to rule out infection by a computer virus entirely, because<br />

checking of a data medium may be forgotten by mistake.<br />

- All computers which do not have a computer virus scanning program must<br />

be checked for infection by a computer virus at regular intervals.<br />

Regardless of which strategy is chosen for providing protection against<br />

computer viruses, there is always a residual risk that computer virus scanning<br />

programs will only detect those computer viruses that were known at the time<br />

when the program was developed. This means that new viruses may not be<br />

detected and could cause damage.<br />

<strong>The</strong> choice of correct strategy, which must also be appropriate from the cost<br />

point of view, is dependent on the particular <strong>IT</strong> environment in each case.<br />

However, in view of the fact that the cost per licence is usually greatly<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!