19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.160 Regulations on computer virus protection<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Head of <strong>IT</strong> Section<br />

In order to obtain effective protection against computer viruses, certain<br />

additional measures must be put in place over and above the use of virus<br />

scanning programs. With this in mind, it is necessary to address the following<br />

points, among others:<br />

Use of computer virus scanning programs<br />

<strong>The</strong> use of these programs is to be specified and documented in accordance<br />

with the chosen strategy and the chosen product (cf. S 2.156 Selection of a<br />

suitable computer virus protection strategy, S 2.157 Selection of a suitable<br />

computer virus scanning program). In addition it is necessary to determine<br />

how, at what intervals and by whom the computer virus scanning programs<br />

will be updated (cf. S 2.159 Updating the computer virus scanning programs<br />

used).<br />

Training of <strong>IT</strong> users<br />

<strong>The</strong> <strong>IT</strong> users affected must be informed of or given training in (cf. S 3.5<br />

Education on <strong>IT</strong> security measures, S 3.4 Training before actual use of a<br />

program, S 6.23 Procedures in the event of computer virus infection) matters<br />

relating to the dangers posed by computer viruses, macro viruses, Trojan<br />

horses and hoaxes (cf. T 5.23 Computer viruses, T 5.43 Macro viruses, T 5.21<br />

Trojan horses, T 5.80 Hoaxes), necessary <strong>IT</strong> security measures, behaviour in<br />

the event of computer virus infection and handling of the computer virus<br />

scanning program.<br />

Ban on the use of non-approved software<br />

<strong>The</strong> installation and use of non-approved software, in particular software that<br />

has not been virus-checked, must be forbidden (cf. S 2.9 Ban on using nonapproved<br />

software). Over and above that it may be necessary to stipulate that<br />

checks on observance of the ban are performed regularly (cf. S 2.10 Survey of<br />

the software held).<br />

Protective measures on the <strong>IT</strong> system<br />

<strong>The</strong> boot sequence during operating system startup must be rearranged such<br />

that as a rule the system is started first from the hard disk (or from the<br />

network) and only then from an external medium (floppy disk, CD-ROM; cf.<br />

S 4.84 Use of BIOS security mechanisms). In addition, an emergency floppy<br />

disk must be created for every available computer type, in order to allow a<br />

successful cleanup in the event of a computer virus infection (cf. S 6.24<br />

Creating a PC emergency floppy disk). If a new computer virus does cause<br />

damage despite the precautions, a backup must be used. Data backups must<br />

therefore be created on a regular basis (cf. S 6.32 Regular data backups).<br />

When data backups are reloaded, care must be taken that no files infected by<br />

the computer virus are restored to the system as a result.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!