19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

S 5.30 Activating an existing call-back option<br />

Initiation responsibility: <strong>IT</strong> Security Management, Administrators<br />

Implementation responsibility: <strong>IT</strong> users, Administrator<br />

Many modems offer an automatic call-back function. If this option is active,<br />

the modem disconnects the line immediately on receiving a call, and then calls<br />

a preset number back. This prevents unauthorised users from misusing the<br />

modem as long as they are not reachable at the preset number. Callback<br />

should be used whenever a specific communications partner needs to dial in<br />

automatically. It should be noted that automatic callback also accepts the costs<br />

of data transfer.<br />

<strong>The</strong> required command is described in the operating instructions; AT%S is<br />

normally used. Before the call-back option is activated, the relevant subscriber<br />

number should be determined.<br />

Some modems also allow automatic call-back to be used with a password.<br />

After establishment of a connection, the called modem prompts the calling<br />

modem for a password. <strong>The</strong> validity of this password is checked by the called<br />

modem. Every valid password is assigned a subscriber number which is called<br />

back. A list of call-back numbers can normally be stored in the local modem<br />

and used to establish connections with it from various remote points.<br />

Note that automatic call-back is only active one side, otherwise the<br />

mechanism would generate an endless loop. Call-back should be activated on<br />

the passive side, i.e. from which data are requested or on which data are<br />

imported. A typical example involves an employee on external duty who<br />

wants to establish contact with an <strong>IT</strong> system within his organisation. This<br />

requires activation of the call-back function on the modem inside the<br />

organisation.<br />

<strong>The</strong> preset call-back numbers must be checked and updated periodically.<br />

A call-back can take place either by the modem or by the application. If the<br />

application used offers this option, the call back should be carried out by the<br />

application and not by the modem. If the modem causes the call-back, an<br />

attacker can attempt to call the modem when it is about to start the call-back<br />

and thus intercept the call-back. If the application causes the call-back, it is<br />

considerably more difficult for an attacker to judge the correct moment.<br />

Additional controls:<br />

- Has payment of costs in the callback mode been clarified?<br />

- When were preset call numbers last checked?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!