HostedDB - Dedicated UNIX Servers

-->
IT baseline protection manual

IT Baseline Protection Manual - Index

A B C D E F G H I j K L M N O P R S T U V W X Z

cable routing, damage minimising S 5.5
cable types, selection of suitable S 1.20 , S 5.3
cabling, insufficient documentation on T2.12
call charges fraud T 5.14
cellular phones T 4.4
CERT S 2.35
certification S 2.66
checksums S 4.34
choice of suitable data formats S 4.134
cleaning staff, hazard posed by T3.6
closed user Group, configuration of S 5.47
closed windows and doors S 1.15
CMIP S 2.144
CMOS-RAM, backup of S 6.27
code keys, impoper use of T 3.21
communications lines, uncontrolled usage of T 2.37
computer microphones S 4.40
computer viruses
- creation of a computer virus protection concept S 2.154
- identification of IT systems potentially threatened by computer viruses S 2.155
- procedure in case of infection S 6.23
- regulations on computer virus protection S 2.160
- reporting computer virus infections S 2.158
- selection of a suitable computer virus protection strategy S 2.156
- selection of a suitable computer virus scanning program S 2.157
- updating the computer virus scanning programs used S 2.159
confidant S 3.7
configuration, changing carefully S 4.78
connection of cables, inadmissible T 3.4
connections, still active T 4.25
contingency in-charge S 6.2
contingency plan S 6.9
copyright, violation of T 2.28
correct disposal of resources requiring protection S 2.13
cryptography
- data backup when using cryptographic procedures S 6.56
- determining the need to use cryptographic procedures and products S 2.162
- development of a cryptographic concept S 2.161
- operating system security requirements when using crypto modules S 4.88
- selection of a suitable cryptographic procedure S 2.164
- selection of a suitable cryptographic product S 2.165
- use of cryptographic procedures on the various layers of the ISO/OSI reference model S 4.90
- violation of basic legal conditions for the use of cryptographic procedures T 3.32
cryptomodule
- design of suitable interfaces for crypto modules S 4.85
- failure of a cryptomodule T 4.34
- improper use of cryptomodules T 3.33
- insecure cryptographic algorithms T 4.35
- manipulation of a cryptomodule T 5.82
- physical security of crypto modules S 4.87
- provisions governing the use of crypto modules S 2.166
- secure separation of roles and configuration with crypto modules S 4.86
- unauthorised use of a cryptomodule T 5.81


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
July 2001
home