HostedDB - Dedicated UNIX Servers

-->
IT baseline protection manual

IT Baseline Protection Manual - Index

A B C D E F G H I j K L M N O P R S T U V W X Z

factory council S 2.40
fax - uncontrolled use of T 2.63
- acknowledging correct origin via telephone S 5.28
- acknowledging successful reception via telephone S 5.27
- adequate siting of S 1.37
- blocking of specific originator numbers S 4.36
- blocking of specific originator numbers S 4.37
- chover sheet S 5.24
- deactivation after office hours S 2.53
- deliberate re-programming of the destination keys T 5.34
- designating authorised operators S 2.48
- designating person in charge of S 2.47
- destination addresses and logs S 5.29
- evaluation of residual information T 5.32
- fading of T 4.14
- fax transmission errors T 4.15
- impersonation of wrong sender T 5.33
- misjudgement of the legally binding of T 3.14
- overload through fax transmissions T 5.35
- procurement S 2.49
- security guidelines for use of faxes S 2.178
- suitable disposal of consumables and spare parts S 2.50
- transmission and reception logs S 5.25
- unauthorised reading of fax transmissions T 5.31
- unauthorised use of T 5.30
- with automatic envelopment sealing system S 4.43
fax server T 5.90
- maintenance of address books and distribution lists S 5.74
- manipulation of address books and distribution lists T 5.90
- procedures controlling the use of S 2.179
- protecting against overloading S 5.75
- secure operation of S 5.73
- selection of a suitable S 2.181
- setting up a fax mail centre S 2.180
fax servers - contingency planning and operational reliability S 6.69
FDDI (Fiber Distributed data Interface) S 5.60
files and data media, transport of S 2.112
filter rules, selection and implementation of suitable S 2.76
fire department S 1.6
fire drills S 6.17
fire extinguishers, hand-held S 1.7
fire extinguishers S 1.7
fire safety inspection S 2.15
fire safety regulations S 1.6
fire sealing S 1.9
fire T 1.4
- and active content S 4.100
- and active content S 4.101
- concept S 2.70
- early detection of fires / fire extinguishing technology S 1.54
- intrusion detection and intrusion response systems S 5.71
- logging S 4.47
- requirements S 2.72
- secure operation of S 2.78
- secure use of protocols and services S 5.39
- security policy S 2.71
- selection of a suitable S 2.73
Floppy disk drive, locking of S 4.4
FTP, File Transfer Protocol S 5.39
ftp S 5.21


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
July 2001
Startseite