HostedDB - Dedicated UNIX Servers

-->
IT baseline protection manual

IT Baseline Protection Manual - Index

A B C D E F G H I j K L M N O P R S T U V W X Z

UDP, user datagram Protocol S 5.39
unauthorised admission to rooms requiring protection T 2.6
unauthorised collection of person related data T 2.61
unauthorised use of rights T 2.7
Unix
- logging in Unix systems S 4.25
- loss of confidentiality sensitive data in the Unix system S 4.22
- activation of system logging S 4.106
- Encryption under Unix and Windows NT S 5.36
- Initial measures after a Unix standard installation S 4.105
- Mandatory password protection under Unix S 4.14
- Regular security checks of the Unix system S 4.26
- restrictive allocation of attributes to user files and directories S 4.20
Unix network, secure integration of DOS PC's into S 5.38
up-to-date infrastructure and building plans S 1.57
updating / upgrading of software and hardware in network components S 4.83
use of a time stamp service S 5.67
use of anti-theft devices S 1.46
use of PGP S 5.63
use of safety doors S 1.10
use of S-HTTP S 5.65
use of SSL S 5.66
user environment, inappropriate restriction of T 2.36
user environment, restricted S 2.32
user features, deactivation of unneeded S 4.38
user separation on an IT-Systen S 2.65
Users / user groups, designation of S 2.30
UUCP security mechanisms S 5.35


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
July 2001
home