Guidance on data protection questions concerning the access of public administration networks to the InternetI. Introduction II. Recommendations III. Security risks in the Internet 1. Protocol-inherent security risks 2. Service-specific security risks IV. Communications analysis V. Firewalls 1. Central firewalls 2. Successive firewalls (Preconditions, application options, demands)
|
||
Zuletzt geändert:
am 13.02.97