19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.189 Blocking of the mobile phone in the event of<br />

its loss<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management,<br />

users<br />

Implementation responsibility: Users<br />

In the event that either the SIM card or the mobile phone are lost, any costs<br />

incurred as a result of misuse of the mobile phone connection will be borne by<br />

the SIM card holder. <strong>The</strong>refore arrangements should be made immediately for<br />

the network provider to block the SIM card in order to exclude the possibility<br />

of the card being misused and the associated financial loss.<br />

In addition, the requirement to enter the SIM card's PIN should always be<br />

enabled (see S 4.114 Use of the security mechanisms provided on mobile<br />

phones). If the card should be stolen or lost, this prevents the SIM card being<br />

used or evaluated by an unauthorised person. However, the user will only be<br />

required to enter the PIN if the mobile phone is switched on. If the mobile<br />

phone is stolen when it is already switched on, a third party could use it to<br />

make calls until the battery is exhausted!<br />

If the mobile phone is lost or stolen, it is also possible for the network<br />

provider to prohibit further use of the mobile phone by placing it on a<br />

"blacklist". To do this, the network provider needs the identifying number of<br />

the phone, the International Mobile Equipment Identifier (IMEI). This is often<br />

found on the back of the phone and should therefore be written down and kept<br />

apart from the device.<br />

Care should be taken to ensure that the IMEI which goes with the mobile<br />

phone is notified in writing at the time of purchase. This number can also be<br />

read from the mobile phone itself, however the procedure involved is not<br />

standard for all mobile phones. <strong>The</strong> identifying number is often to be found on<br />

the identification plate underneath the battery or it can be displayed by<br />

entering "*#06#".<br />

To ensure that misuse of the SIM card is noticed promptly, the itemised call<br />

breakdown should always be checked for inexplicable charges and destination<br />

numbers.<br />

All the data which is required to block the SIM card or mobile phone should<br />

be at hand but kept separately from the mobile terminal itself. This data is as<br />

follows:<br />

- the call number of the mobile phone connection and the associated SIM<br />

card number,<br />

- the serial number of the mobile phone,<br />

- the service number of the network provider which has to be called in order<br />

to have the phone blocked and<br />

- the service number password and customer number, i.e. the data which is<br />

needed in order to authenticate oneself to the network provider.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Get SIM card blocked as<br />

soon as it is lost!

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!