8.6 IT Security
Computers exposed to special risks, for example, in the demilitarized zone (DMZ), can also be protected with a host-based intrusion prevention system. All computer systems are equipped with virus scanners in order to withstand the permanent threat due to malware. The remote administration and connection of other networks is effected by VPN tunnels that guarantee access protection at the highest level. The load-carrying network infrastructure itself (routers, switches) also undergoes system hardening in order to match up to the consistently high security requirements for the system as a whole. CERT checks the products for weak points by means of selective hacker attacks. The team also collects and distributes reports on weak points and upgrade reports for third-party components and links them to recommendations, concrete proposals and implementation specications.
475