19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

phone is switched on. For example, this PIN can be used to prevent the mobile<br />

phone being used with a different SIM card (anti-theft protection).<br />

Access to mailbox<br />

<strong>The</strong> network provider can set up a mailbox for every subscriber which<br />

amongst other functions serves as an answerphone. As the mailbox can be<br />

interrogated from anywhere and also from any terminal device, it must be<br />

protected against unauthorised access with a PIN. When the mailbox is first<br />

set up, the network provider issues a predefined PIN. It is important that this is<br />

changed immediately.<br />

Other passwords<br />

As well as the various personal identification numbers listed above, there may<br />

be additional passwords for various types of use. For example, a password will<br />

be required to access the user data held by the network provider. Thus, a<br />

password may be required when the user rings the hotline to query a bill.<br />

Services which incur additional charges, such as retrieval of information or<br />

getting the network provider to perform certain configurations are generally<br />

protected through additional passwords. Like all other passwords, these should<br />

be chosen carefully and kept securely.<br />

As a general rule, all PINs and passwords should be handled with care (see<br />

also S 2.11 Provisions governing the use of passwords).<br />

Note: <strong>The</strong>re have been a number of cases recently in which criminals have<br />

attempted to obtain the PIN or PUK of mobile phone users over the phone<br />

by posing as staff of a network provider and pretending that there is a<br />

technical defect. <strong>Information</strong> on personal identification numbers should<br />

never be given out over the telephone.<br />

<strong>The</strong>re are many different security mechanisms available with mobile phones.<br />

Which of these are available and how they can be activated depends on the<br />

particular mobile phone used, the SIM card and the selected network provider.<br />

<strong>The</strong>refore the network provider's operating instructions and security<br />

instructions should be evaluated carefully. Where company phones are used, it<br />

is recommended that the most important security mechanisms are<br />

preconfigured and also documented in a well laid out leaflet.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!