19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

solution). In order to secure the transmission of data that is binding or subject<br />

to proof, it can additionally be assigned a digital signature from the originator.<br />

In this way the source and authenticity of the message can be verified by the<br />

recipient, and any manipulation that has been carried out in the public network<br />

can be reliably detected. To ensure the secure generation and storage of the<br />

signature key, use is made once again of the chip card, which is an essential<br />

component of the security concept. One extremely important point concerning<br />

the connection of computers is the need for appropriate measures to prevent<br />

the possibility of inadvertent incorrect switching, which is not usually detected<br />

before or during the transmission – in contrast with telephone calls. This can<br />

be achieved with built-in firewall functionality in the ISDN security<br />

component. With monitoring of the signalling channel (D channel), the<br />

security component can be set up in such a way that only explicitly<br />

preconfigured crypto connections will be established. In connection with<br />

PBXs, there is also provision that certain call numbers and functions can be<br />

disabled in the exchanges. This helps to limit the extent to which the<br />

vulnerable "remote maintenance" and "call deflection" functions can be<br />

exploited.<br />

In order to obtain both secure key management and fast real-time encryption<br />

of the user data, hybrid techniques should be used. <strong>The</strong> method of symmetrical<br />

information encryption is retained, while a key known as the session key is<br />

exchanged with the aid of an asymmetrical procedure. In practical operation,<br />

this proceeds entirely automatically. In this way it is possible to agree new<br />

session keys for every new ISDN connection without any significant detriment<br />

to operating convenience.<br />

From the security standpoint, the end user should apply the following usage<br />

criteria and conditions when selecting and using an ISDN security component:<br />

(Rating: + = important to +++ = very important):<br />

- <strong>The</strong> individual user keys and authentication information must be stored on<br />

a secure medium (e.g. a chip card) and safeguarded with the aid of a<br />

trustworthy signature (+++).<br />

- For the purpose of encrypting a communication relationship (voice, data,<br />

video, etc.), a new secret key, known as the session key, is to be agreed for<br />

each transmission (++).<br />

- <strong>The</strong> security services are performed automatically and are fully transparent<br />

to the end system or end user (+).<br />

- <strong>The</strong> security component is always set up in crypto mode for selected<br />

connections (+++).<br />

- <strong>The</strong> existing infrastructure should be retained in its entirety when the<br />

security components are used (+).<br />

- It should be possible to perform security administration for the security<br />

components on a network-wide basis and, if possible, from a central point<br />

(+).<br />

- Online operational monitoring and registration of all security components<br />

in dialogue with the management station is desirable (+).<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!