19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

procedures directly in hardware, for example as a separate security module or<br />

as a plug-in card.<br />

It is not possible to offer any general recommendation on which type of<br />

implementation should be chosen, because various factors have to be weighed<br />

up before the decision is made:<br />

- <strong>The</strong> protection requirements applying to the data to be protected by the<br />

cryptographic procedure, or the security level aimed for<br />

- <strong>The</strong> intended data throughput<br />

- Economic considerations and constraints<br />

- <strong>The</strong> operating environment and surrounding safeguards<br />

- National classification of the data being processed, if applicable<br />

Software solutions offer the advantage of being easily adaptable and low-cost.<br />

Hardware implementations generally offer both greater resistance to<br />

manipulation (and therefore greater security) and a higher throughput rate than<br />

software implementations, but they are usually also more expensive.<br />

Firmware solutions can be seen as a compromise between the two other<br />

options. However, the advantages and disadvantages of each implementation<br />

always relate only to local aspects (including key management, above all).<br />

Once the data has been encrypted and is on the communication path, the way<br />

in which the encryption came about is essentially no longer relevant.<br />

One example of (relatively) inexpensive, transportable and user-friendly<br />

crypto modules is chip cards, which can be used in the field of local<br />

encryption as a secure storage medium for cryptographic keys or in the field<br />

of authentication for password generation and encryption.<br />

When all of the requirements to be met by the cryptographic product have<br />

been defined, you have at your disposal a portfolio of requirements which can<br />

then also be used directly in an invitation to tender, should one be necessary.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!