HostedDB - Dedicated UNIX Servers

-->
IT baseline protection manual

IT Baseline Protection Manual - Index

A B C D E F G H I j K L M N O P R S T U V W X Z

lack of
- compatible, or unsuitable, resources T 2.3
- or inadequate, test and release procedures T 2.26
- or insufficient, rules T 2.1
laptop PCs
- software re-installation in case of users S 4.28
- non-regulated change of users in the case of laptop PCs T 2.16
- orderly issue and retrieval S 2.36
- pooled storage S 1.35
- safe keeping during mobile use S 1.33
- Safe keeping of laptop PCs during stationary use S 1.34
- use of encryption products S 4.29
lightning arrestor S 1.4
lightning T 1.3
lightning protection S 1.4
line bandwidth, inadequate T 2.32
lines

- avoidance of water pipes S 1.24
- galvanic separation S 1.5
- impairment due to environmental factors T 4.4
- line tapping T 5.7
- physical protection of S 1.22
- removal, short circuting or grounding of unneeded S 5.1
- tapping of T 5.7
location plans of supply lines S 1.11
log files, checking of S 2.64
logging
- at servers S 5.9
- data privacy guideline for S 2.110
- data privacy guidelines for logging procedures S 2.110
- of PBX administration jobs S 4.5
- Unix logging in Unix systems S 4.25
login Bypass T 5.55
log-in, secured S 4.15
loss of confidentiality
- IT user error T 3.1
- loss of confidentiality of sensitive data of the network to be protected T 2.24
- loss of confidentiality through hidden pieces of data. T 2.54
- of information that should be protected T 5.85
- of sensitive data in the Unix system T 2.15
- of sensitive data under Unix S 4.22
loss of confidentiality of classified information T 5.71
loss of confidentiality through IT user error T 3.1
loss of data
loss of data - due to exhausting storage medium T 4.20
loss of data - due to intensive magnetic fields T 1.9
loss of data - in a database caused by a lack of storage space T 4.29
loss of data due to intensive magnetic fields T 1.9
loss of personnel resources T 1.1
loss of stored data T 4.13
Lotus Notes
- hacking Lotus Notes T 5.101
- abuse of active contents on access T 5.100
- configuration for browser access to Lotus Notes S 4.122
- configuration of authentication mechanisms with browser access to Lotus Notes S 4.124
- creation of a contingency plan S 6.73
- configuration of SSL-protected browser access to Lotus Notes S 4.123
- encryption of Lotus Notes databases S 4.131
- error in the configuration of browser access T 3.47
- error in the configuration of a Lotus Notes server T 3.46
- instituting restrictions on access to Lotus Notes databases with browser access S 4.125
- monitoring of a Lotus Notes system S 4.132
- secure handling of Notes ID files S 4.129
- security measures following the creation of a new Lotus Notes database S 4.130
- secure configuration of browser access to Lotus Notes S 4.127
- secure operation of Lotus Notes S 4.128
- secure configuration of a Lotus Notes client S 4.126
- secure installation S 4.116
- use of encryption procedures for Lotus Notes communication S 5.84
- use of encryption procedures for Lotus Notes e-mail S 5.85
- use of encryption procedures with browser access S 5.86


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
July 2001
home