HostedDB - Dedicated UNIX Servers

-->
IT baseline protection manual

IT Baseline Protection Manual - Index

A B C D E F G H I j K L M N O P R S T U V W X Z

damaging of cables, inadverted T 3.5
data backup S 6.32
- commitment of employees S 2.41
- documenting of generated S 6.37
- influencial factors S 6.34
- of configuration data for PBX S 6.26
- of database S 6.49
- on PCs S 6.19
- on servers S 6.25
- plan S 6.13
- procedures for S 6.35
- under Windows 95 S 6.45
- under Windows NT S 6.44
- when using cryptographic procedures S 6.56
data backup policy, development of S 6.33
data media
- defective T 4.7
- dispatch of S 2.3
- improper delivery T 2.18
- inadequate labelling T 2.17
- loss during transfer T 3.12
- secure deletion of data media S 2.167
- not available when required T 2.10
- transport, insecure T 2.47
data records, transfer of incorrect or undesired T 3.13
data restoration S 6.41
data storage
- structured data storage S 2.138
- Unstructured data organisation T 3.31
data, manipulation of T 5.2
database access, complexity of T 2.40
database links, restricted utilisation of S 4.71
database security mechanisms, lack of or inadequate T 2.38
database systems, manipulation of data or software in T 5.64
databases
- access control to system S 2.128
- access control S 2.129
- archiving of S 6.50
- checks of the log files S 2.133
- data backup of database S 6.49
- data backup of S 6.49
- database accounts, locking and deleting of no longer required S 4.67
- database integrity S 2.130
- database security concept, creation of S 2.126
- databases procedures in case of loss of database integrity S 6.48
- encrypting S 4.72
- ensuring consistent database management S 4.68
- guidelines for queries S 2.134
- installation and configuration S 2.125
- installation of ODBC drivers S 5.58
- loss of data T 4.28
- loss of database integrity/consistency T 4.30
- monitoring of S 4.70
- poor organization of the exchange of database users T 2.41
- prevention of inference S 2.127
- provisions for the installation of users and groups S 2.132
- regular checks for security of S 4.69
- restoring a database S 6.51
- save data transfer S 2.135
- selection of suitable software S 2.124
- separation of administrative tasks S 2.131
- specifying upper limits S 4.73
DBMS
- complexity of T 2.39
- improper administration of T 3.23
D-channel filter S 4.62
development of a network concept S 2.141
development of a network management concept S 2.143
development of an Emergency Procedure Manual S 6.3
digital signature S 4.34
dirt accumulation T 1.8
disabling the server while in operation T 3.35
dispatch of data media S 2.3
- adequate labelling S 2.43
- backup copy of data S 6.38
- briefing on procedures S 3.14
- determination of communication partners S 2.42
- dispatch of S 5.23
- forwarding of, unauthorises copying of T 5.29
- physical deletion of media S 4.32
- rules for S 2.45
- safekeeping before and after S 1.36
- secure packaging S 2.44
- use of virus scan programms S 4.33
- virus scan program S 4.33
distributors
- inadequately protected T 2.13
- lists and alias files, checking of S 5.55
- neutral documentation in distributors S 2.19
- physical protection of S 1.22
- regulations governing access S 1.2
DNS, Domain Name Service S 5.39
DNS, Domain Name Service S 5.39
DNS-spoofing , protection against DNS spoofing
DNS-spoofing T 5.78 , S 5.59
documentation
- data backup procedures S 6.37
- lack of or inadequate T 2.27
- neutral documentation of distributor S 2.19
- of capacity requirements S 6.4
- of changes made to an existing IT system S 2.34
- of ights profiles S 2.31
- of ISDN cards configuration S 2.107
- of Novell NetWare 4.x networks S 2.153
- of the system configuration S 2.25
- on authorised users and on rights profiles S 2.31
- on the capacity requirements of IT applications S 6.4
- on, and marking of, cabling S 5.4
documentation -cabling, documentation on and marking of S 5.4
domain planning, inadequate T 2.30
doors, locked S 1.23
down-times, tolerable S 6.1
drainage, automatic S 1.14
dust T 1.8


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
July 2001
Startseite