HostedDB - Dedicated UNIX Servers

-->
IT baseline protection manual

IT Baseline Protection Manual - Index

A B C D E F G H I j K L M N O P R S T U V W X Z

ICMP Protocol, abuse of T 5.50
impairment of IT usage on account of adverse working conditions T 2.14
implementation of IT security safeguards Section 2.5
improper administration T 3.9
improper use of the IT system T 3.8
inadvertent sharing of the file system T 3.26
incorrect administration of site and data access rights T 3.16
inoperability of existing safeguards T 4.3
inspection rounds S 2.18
installing stand-alone-systems for Internet use S 5.46
insufficient monitoring of IT security measures T 2.4
insurance S 6.16
interfaces, protection of S 1.32
internal supply networks, failure of T 4.2
inter-office slip S 3.6
introduction of a PC Checklist Booklet S 2.24
intruder detection device S 1.18
IP Spoofing T 5.48
IP, Internet Protocol S 5.39
ISDN router
- deactivation of functions which are not required S 4.60
- secure siting of S 1.43
- relinquishment of remote maintenance S 2.108
ISDN-card
- authentication with CLIP/COLP S 5.48
- authentication with PAP/CHAP S 5.50
- callback S 5.49
- deactivation of functions which are not required S 4.59
- documentation of the configuration of ISDN cards S 2.107
- procuring S 2.106
- use of existing security functions S 4.61
ISDN-D channel, manipulations via T 5.63
IT equipment, destruction of T 5.1
IT security
- awareness training S 2.198
- Information security Policy, drawing up S 2.192
- maintenance of S 2.199
- management reports on S 2.200
IT systems
- adequate siting of S 1.29
- analysis before the introduction of a system management system S 2.168
- schedule of existing S 2.194
- unauthorised use of T 5.9
Iventory S 2.2


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
July 2001
home