19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Telecommunications Answering Machine<br />

_________________________________________________________________________________________<br />

8.3 Answering Machine<br />

Description<br />

This chapter deals with answering machines which, in addition to telephones, can be connected to the<br />

local telephone network in the building. <strong>The</strong>y normally serve to record incoming calls or messages in<br />

the form of speech in case the called party is not personally available. <strong>The</strong>se devices differ in terms of<br />

recording techniques: fully analogue, fully digital and a combination of analogue/digital. Particularly<br />

the currently widespread remote inquiry feature makes it recommendable to consider answering<br />

machines as <strong>IT</strong> systems and carries considerable threat potential.<br />

Threat Scenario<br />

<strong>The</strong> following typical threats are assumed for answering machines as part of <strong>IT</strong> baseline protection:<br />

Force Majeure<br />

- T 1.8 Dust, soiling<br />

Organisation deficiencies<br />

- T 2.1 Lack of, or insufficient, rules<br />

- T 2.5 Lack of, or inadequate, maintenance<br />

- T 2.6 Unauthorised admission to rooms requiring protection<br />

Human Failure:<br />

- T 3.15 Improper use of answering machines<br />

Technical Failure:<br />

- T 4.1 Disruption of power supply<br />

- T 4.18 Discharged or fatigued emergency power supply in answering machines<br />

- T 4.19 <strong>Information</strong> loss due to exhausted storage medium<br />

Deliberate Acts:<br />

- T 5.36 Deliberate overloading of answering machines<br />

- T 5.37 Determining access codes<br />

- T 5.38 Misuse of remote inquiry<br />

Recommended Countermeasures (S)<br />

For the implementation of <strong>IT</strong> baseline protection, selection of the required packages of safeguards<br />

("modules") as described in chapters 2.3 and 2.4, is recommended.<br />

<strong>The</strong> safeguards package for an "Answering Machine" is presented in the following.<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000<br />

.... Bitte sprechen Sie<br />

nach dem Piepston. Danke!<br />

.....piiiiep.....

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!