19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

S 4.40 Preventing unauthorised use of computer<br />

microphones<br />

Initiation responsibility: <strong>IT</strong> Security Management<br />

Implementation responsibility: <strong>IT</strong>-user<br />

<strong>The</strong> microphone on a networked computer can be used by persons having<br />

access to the corresponding device file (e.g. /dev/audio under UNIX). Under<br />

Windows NT the access right to the appropriate registry codes determine who<br />

can activate the computer microphone<br />

(HKEY_LOCAL_MACHINE\HARDWARE\). This authorisation must therefore<br />

be granted judiciously. Access to the device file should only be possible whilst<br />

somebody is working on the <strong>IT</strong> system. If a microphone is to be prevented<br />

from being used in general, it must, if possible, be turned off or separated<br />

physically from the computer.<br />

For microphones which are integrated into computers and can only be<br />

activated/deactivated using software, the access rights must be restricted to<br />

authorised users. Under UNIX this is possible, for example, by depriving all<br />

relevant users of the right to read the /dev/audio device file; under Windows<br />

NT by depriving users of access to the appropriate registry codes. This<br />

prevents these users from using the microphone but still allows them to play<br />

back audio files.<br />

On <strong>IT</strong> systems equipped with a microphone, a check must be made as to<br />

whether access rights and ownership are changed on opening of the device. If<br />

this is the case, or if every user should be able to use the microphone without<br />

the administrator having to release it individually, the administrator must<br />

provide a command which<br />

- can only be activated once a user has logged into the <strong>IT</strong> system<br />

- can only be activated by this user and<br />

- withdraws the access right from this user after log-out.<br />

If access to the microphone is not controlled by means of a secure command,<br />

the microphone must be disconnected physically from the computer.<br />

Additional controls:<br />

- Can the computer's microphone be turned off or disconnected physically<br />

from the computer?<br />

- Who has access to the microphone's device file or to the entries in the<br />

registry where hardware settings may be manipulated?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!