19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Other <strong>IT</strong> Components Mobile Telephones<br />

_________________________________________________________________________________________<br />

<strong>The</strong> information stored on the SIM card includes the subscriber-specific call number (MSISDN). <strong>The</strong><br />

cryptographic algorithms for authentication and encryption of user data are also implemented on the<br />

SIM card. In addition, short text messages, call charge information and a personal telephone directory<br />

can also be stored on the card.<br />

SIM Toolkit<br />

Since 1999, mobile phones and SIM cards with extended menu functionality have been available on<br />

the market. This new standard "SIM Toolkit" defines new functions between SIM card and mobile<br />

transceiver. As such, it is now possible to download new data and programs provided by the network<br />

provider on a regular basis. In this way SIM Toolkit allows some completely new services to be<br />

implemented. For example, it provides the card provider with the means to tailor the menu structure of<br />

the mobile phone to individual customers’ requirements. Thus, if the customer would like to make a<br />

hotel reservation or make the travel arrangements for a business trip using his mobile phone, the menu<br />

structure of the mobile phone is appropriately modified by the service provider. However, this does<br />

require that both the card and also the mobile terminal support the SIM Toolkit standard.<br />

Base station<br />

Every network provider maintains a large number of transmitting stations also called Base Transceiver<br />

System (BTS). Each of these stations can cover an area having a radius of between 250m and 35km,<br />

depending on the transmitter power and terrain conditions. <strong>The</strong> coverage area of a transmitting station<br />

is referred to as a radio cell. Several radio cells are controlled from one control station or Base Station<br />

Controller (BSC). <strong>The</strong> combination of transmitting stations and control station in turn is referred to as<br />

Base Station Subsystem (BSS) or base station for short.<br />

<strong>The</strong> base station thus constitutes the interface between the network and the mobile phone. It is here<br />

that channels for signalling data and user data are made available. <strong>The</strong> base station is controlled via the<br />

Mobile Switching Centre (MSC). This switching node assumes all the technical functions of a landline<br />

network switching node, for example, path search, signal path switching and processing of<br />

supplementary services. If there is a requirement for a connection to a subscriber in the landline<br />

network, this is forwarded by the MSC to the landline network over a switching path (the Gateway<br />

Mobile Switching Centre, GMSC).<br />

<strong>The</strong> encryption of the data on the radio interface, i.e. between mobile phone and base station, can be<br />

viewed as a special feature of the GSM network as opposed to the landline network. This should<br />

protect the subscriber against unauthorised passive monitoring.<br />

Registers<br />

In order that the network provider is in a position to provide all the services for which demand exists,<br />

it must store various items of data. For example, it must know which subscribers are using its network<br />

and which services they wish to use. This data, such as the name of the subscriber, his customer<br />

number and the services he requires, are stored in the Home Location Register (HLR). If a connection<br />

is to be established, for example from a landline network terminal to a mobile phone, the network<br />

provider needs to know where the subscriber is and whether his mobile phone is switched on. This<br />

information is held in the Visitor Location Register (VLR) and the HLR. To check whether the<br />

subscriber is entitled to use the mobile communication network (i.e. he has taken out a card contract),<br />

the network provider maintains an identification register at the Authentication Centre (AUC). This<br />

holds the security code of the SIM card as well as the PINs determined by the subscriber.<br />

<strong>The</strong> network provider can also maintain an equipment register, the Equipment Identification Register<br />

(EIR), which holds details of all the mobile transceivers permitted on the network broken down into<br />

three groups known as the white, grey and black lists. <strong>The</strong> white list is a register of all the mobile<br />

phones which are functioning reliably, the grey list contains all the phones which may possibly be<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!