|
IT Baseline Protection Manual - Index
backbone-technologie, selection of a suitable S 5.60
backup copy of the software used S 6.21
backup data media, suitable storage of S 6.20
ban on smoking S 2.21
ban on using non-approved software S 2.9
bandwidth planning, insufficient T 2.11
basic security check Section 2.4
BIOS security mechanisms, use of S 4.84
breaking and entering, protection against S 1.19
break-ins, protection against S 1.19
briefing of staff
- use of answering machines S 3.16
- use of fax machines S 3.15
- use of modems S 3.17
burglary T 5.3
burning cables T 1.6
© Copyright
by Bundesamt für Sicherheit in der Informationstechnik |
last update: July 2001 |