|
IT Baseline Protection Manual - Index
cable routing, damage minimising S 5.5
cable types, selection of suitable S 1.20 , S
5.3
cabling, insufficient documentation on T2.12
call charges fraud T 5.14
cellular phones T 4.4
CERT S 2.35
certification S 2.66
checksums S 4.34
choice of suitable data formats S 4.134
cleaning staff, hazard posed by T3.6
closed user Group, configuration of S 5.47
closed windows and doors S 1.15
CMIP S 2.144
CMOS-RAM, backup of S 6.27
code keys, impoper use of T 3.21
communications lines, uncontrolled usage of T 2.37
computer microphones S 4.40
computer viruses
- creation of a computer virus protection concept S
2.154
- identification of IT systems potentially threatened by computer viruses S
2.155
- procedure in case of infection S 6.23
- regulations on computer virus protection S 2.160
- reporting computer virus infections S 2.158
- selection of a suitable computer virus protection strategy S
2.156
- selection of a suitable computer virus scanning program S
2.157
- updating the computer virus scanning programs used S
2.159
confidant S 3.7
configuration, changing carefully S 4.78
connection of cables, inadmissible T 3.4
connections, still active T 4.25
contingency in-charge S 6.2
contingency plan S 6.9
copyright, violation of T 2.28
correct disposal of resources requiring protection S
2.13
cryptography
- data backup when using cryptographic procedures S
6.56
- determining the need to use cryptographic procedures and products S
2.162
- development of a cryptographic concept S 2.161
- operating system security requirements when using crypto modules S
4.88
- selection of a suitable cryptographic procedure S
2.164
- selection of a suitable cryptographic product S 2.165
- use of cryptographic procedures on the various layers of the ISO/OSI reference
model S 4.90
- violation of basic legal conditions for the use of cryptographic procedures
T 3.32
cryptomodule
- design of suitable interfaces for crypto modules S
4.85
- failure of a cryptomodule T 4.34
- improper use of cryptomodules T 3.33
- insecure cryptographic algorithms T 4.35
- manipulation of a cryptomodule T 5.82
- physical security of crypto modules S 4.87
- provisions governing the use of crypto modules S
2.166
- secure separation of roles and configuration with crypto modules S
4.86
- unauthorised use of a cryptomodule T 5.81
© Copyright
by Bundesamt für Sicherheit in der Informationstechnik |
last update: July 2001 |