19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Data Transmission Systems E-Mail<br />

_________________________________________________________________________________________<br />

7.4 E-Mail<br />

Description<br />

Electronic mail service (e-mail in short) allows the world-wide transmission and reception of<br />

electronic messages within very brief periods of time. An e-mail usually consists of an address<br />

(from/to), subject (title or reference), text body and, occasionally, one or more attachments. E-mail not<br />

only allows information to be exchanged quickly, conveniently and informally, but also makes it<br />

possible to forward business transactions to other parties for the purpose of further processing.<br />

Depending on the context in which e-mail is used, different requirements apply to the confidentiality,<br />

availability, integrity and mandatory nature of the transmitted data as well as the e-mail software in<br />

use.<br />

Threat Scenario<br />

<strong>The</strong> following typical threats are assumed as regards <strong>IT</strong> baseline protection of files exchanged via email:<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000<br />

srffgdfjbnnkgdhydbnkjydgbndgnvkjhbnjkgblngxbngcnliughqhonvzijgbv

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!