19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

Disclosure of call numbers<br />

It is possible to choose whether and what data on mobile phone connections<br />

should be entered in public phone directories and/or be available to users of<br />

directory enquiry services. If a call number is entered it is easier for other<br />

people to call one. However, this is not appropriate for all applications, e.g.<br />

where a mobile phone pool is used or if it is desirable to keep the number of<br />

incoming calls low.<br />

If the calling number display function is enabled, persons called can see the<br />

number from which they are being called (assuming their equipment has the<br />

appropriate configuration). This service can generally be enabled or disabled<br />

by the network provider for a given mobile phone.<br />

Call number suppression<br />

In the GSM network, the number from which a call is being made can be<br />

indicated to the recipient of a call. If this is not desirable, then the precautions<br />

suggested in S 5.79 <strong>Protection</strong> against call number identification during use<br />

of mobile phones should be heeded.<br />

<strong>Protection</strong> against interception of phone calls<br />

<strong>The</strong> only effective protection against interception of the contents of phone<br />

calls is to employ interoperable, network-wide end-to-end encryption. As this<br />

encryption is not implemented, every connection over either the landline<br />

network or the mobile communication network can potentially be intercepted.<br />

However, in Germany and most other countries communications between<br />

mobile phone and base station are automatically encrypted.<br />

<strong>The</strong> following measures are recommended as a means of reducing the threat:<br />

- Phone calls should not be made at any time and in any place. To make a<br />

phone call, a quiet area should be sought (this will also mean less<br />

disturbance to other people).<br />

- As a matter of principle, confidential information should not be<br />

communicated on the telephone.<br />

- Some mobile phones indicate on the display when the transmission<br />

between mobile phone and base station is not encrypted. If such a display<br />

is provided, users should be told about it. From time to time users should<br />

glance at the display to satisfy themselves that calls are actually being<br />

encrypted. Thus, for example, there are some countries in which<br />

communications between mobile phone and base station are not encrypted.<br />

- <strong>The</strong>re are also a few, relatively expensive mobile phones which allow endto<br />

end encryption of communications. However, to avail oneself of this<br />

facility, both the caller and the person receiving the call must use<br />

compatible equipment. If there is a need to frequently communicate highly<br />

sensitive information over mobile phone, it may be appropriate to invest in<br />

such equipment.<br />

- Where data is to be transmitted e.g. from a laptop over GSM, it should be<br />

encrypted on the terminal device prior to transmission. A number of<br />

programs are available for achieving this relatively simply.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!