19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Telecommunications Fax Machine<br />

_________________________________________________________________________________________<br />

8.2 Fax machine<br />

Description<br />

This chapter deals with information transfer via facsimile<br />

(fax). <strong>The</strong> transmission standard (e.g. CC<strong>IT</strong>T group 3) was<br />

not used for differentiation purposes for the selection of<br />

safeguards as part of <strong>IT</strong> baseline protection. In this module<br />

the technical basis to be considered are common stand-alone<br />

fax machines, but not fax cards or fax servers (see chapter 8.5<br />

Fax server).<br />

Threat Scenario<br />

<strong>The</strong> following typical threats are assumed for fax information transfer as part of <strong>IT</strong> baseline<br />

protection:<br />

Organisational Shortcomings<br />

- T 2.20 Inadequate supply of printing consumables for fax machines<br />

Human Failure<br />

- T 3.14 Misjudgement of the legal force of a fax<br />

Technical Failure<br />

- T 4.14 Fading of special fax paper<br />

- G 4.15 Fax transmission errors<br />

Deliberate Acts<br />

- T 5.7 Line tapping<br />

- T 5.30 Unauthorised use of a fax machine or fax server<br />

- T 5.31 Unauthorised reading of fax transmissions<br />

- T 5.32 Evaluation of residual information in fax machines and fax servers<br />

- T 5.33 Impersonation of wrong sender on fax transmissions<br />

- T 5.34 Deliberate re-programming of the destination keys on fax machines<br />

- T 5.35 Deliberate overload through fax transmissions<br />

Recommended Countermeasures (S)<br />

For the implementation of <strong>IT</strong> baseline protection, selection of the required packages of safeguards<br />

("modules"), as described in Sections 2.3 and 2.4, is recommended. In the following, the<br />

countermeasure package for "fax machines" is set out:<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!