HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual T 3.28 Inadequate configuration of active network components

T 3.28 Inadequate configuration of active network components

Throughan inadequate configuration of the network components, the availability of the entire network or segments of it, or the confidentiality of information and the integrity of data can be impaired. The following types of incorrect configuration need to be distinguished in particular:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
 
home