19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

call number. Your bank." Depending on the content of a short message<br />

received, it may be appropriate to make subsequent enquiries as to whether the<br />

originator really did send this message.<br />

It is quite common for short messages to end up with the wrong recipient as an<br />

incorrect call number has been entered or the wrong entry has been selected<br />

from the telephone directory as the recipient. Even if mobile phone displays<br />

are small, the recipient details should still be checked prior to sending a<br />

message.<br />

Faxes<br />

It is also possible to send faxes to the landline network via SMS. Again, faxes<br />

can be received as long as they satisfy the restrictions of SMS transmissions,<br />

especially as regards containing only a short text. Faxes can also be sent and<br />

received using an <strong>IT</strong> system linked to the mobile phone (e.g. a notebook).<br />

When using the fax capability, the points to be noted are similar to those<br />

which apply to conventional fax machines (see Section 8.2 Fax machines),<br />

namely:<br />

- <strong>The</strong> memory of the mobile phone can become overloaded by incoming<br />

faxes.<br />

- Depending on the importance of the faxes, it may be necessary to make<br />

copies of them, something which can be difficult with a mobile phone.<br />

- It may be appropriate to block the call numbers of certain fax recipients<br />

and originators.<br />

- It may be appropriate to enquire after sending a fax whether it arrived in<br />

legible fashion.<br />

- It may be appropriate after receiving a fax to check whether it was really<br />

sent by the originator indicated.<br />

- It may be appropriate to review the destination addresses programmed<br />

from time to time.<br />

E-mail<br />

Again, it is possible to receive and send e-mails over mobile phones as well as<br />

short messages. <strong>The</strong> permitted length of an e-mail is usually only 160<br />

characters, as for short messages. When this service is configured by the<br />

network provider, the mobile phone is given its own e-mail address.<br />

With some network providers, e-mail services can be combined with other<br />

services. Thus, for example, incoming e-mails can be read by voice output<br />

software, forwarded to a fax machine or to a different e-mail address.<br />

Outgoing e-mails can be spoken into the mobile phone and sent as an audio<br />

file (WAV file).<br />

Like short messages and faxes, e-mails too can quickly exhaust the available<br />

memory space. Moreover, the contract with the network provider may specify<br />

that only a limited number of e-mails can be sent or received per month.<br />

Potential security problems and safeguards to be adopted in connection with<br />

the use of e-mail are described in Section 7.4 E-mail. It should be noted here<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!