HostedDB - Dedicated UNIX Servers

-->
IT baseline protection manual

IT Baseline Protection Manual - Index

A B C D E F G H I j K L M N O P R S T U V W X Z

macro viruses S 4.44 , T 5.43
mail bombs T 5.76
mail overload, protection from S 5.54
mailserver, secure operation of S 5.56
maintenance, lack of or inadequate T 2.5
maintenance S 2.4
management system
- creation of an emergency plan for the failure of the management system S 6.57
- handling of security incidents S 6.58
- unsuitable configuration of the management system T 3.34
manipulation
- of data or software T 5.2
- of lines T 5.8
- of management parameters T 5.86
masquerading T 5.25
minimal data backup policy S 6.36
misuse of active contents T 5.88
mobile phones
- bugging of indoor conversations over mobile phones T 5.99
- call number identification S 5.79
- carelessness in handling information T 3.44
- failure precautions S 6.72
- failure T 4.42
- inadequate checking of the identity of communication partners T 3.45
- inappropriate handling of passwords T 3.43
- misuse of cards T 5.98
- movement profiles S 5.78
- non-availability of the mobile communication network T 4.41
- safeguarding the power supply S 4.115
- secure data transmission S 5.81
- security guidelines S 2.188
- setting up a pool S 2.190
- unauthorised transfer of data T 5.97
- use of security mechanisms S 4.114
modem
- callback S 5.30
- secure administration S 2.60
- suitable siting S 1.38
monitoring of existing connections S 2.20


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
July 2001
home