19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Other <strong>IT</strong> Components Mobile Telephones<br />

_________________________________________________________________________________________<br />

defective, while the black list holds details of all the phones which either have a fault or have been<br />

reported stolen. However, not all network providers maintain an equipment register.<br />

In order that the network provider can prepare billing details of the services used by customers, the<br />

call data must be stored. This includes, for example, details of communication partners (e.g. call<br />

numbers dialled), time and duration of the connection and the location identifiers of the mobile<br />

terminals.<br />

Call establishment<br />

As soon as the owner switches on his mobile phone, it registers with the network provider via the<br />

nearest base station. <strong>The</strong> subscriber is identified to the network provider by means of his SIM card and<br />

cryptographic algorithms installed on this card. Authentication is effected with the aid of a key which<br />

is known only to the network provider and the subscriber. <strong>The</strong> network provider logs and stores data<br />

on the identity of the user, the serial number of the mobile phone and the identity of the base station<br />

over which he has registered. This occurs even if no conversation takes place. Moreover, information<br />

is stored on every number dialled, irrespective of whether a connection is established. As a result the<br />

network provider knows which subscribers are on the network so that connections can now be<br />

established from and to subscribers.<br />

Landline network<br />

<strong>The</strong> conventional public telephone network with its connecting paths is referred to as the landline<br />

network.<br />

As every mobile phone connection also entails the use of landline networks, a number of threats<br />

relating to the landline network apply also where mobile communication networks are used. <strong>The</strong> lineconnected<br />

part of the GSM network is a special instance of an ISDN network. Hence, most of the<br />

threats and safeguards which apply to ISDN are applicable to GSM as well. Section 8.4 LAN<br />

connection of an <strong>IT</strong> system via ISDN is therefore also relevant to data transmission over GSM.<br />

This chapter considers those security characteristics of mobile phones which are relevant to persons<br />

using them. <strong>The</strong> intention is to present a systematic approach as to how to draw up a concept for the<br />

use of mobile phones within an organisation and ensure that this is implemented and integrated.<br />

Threat Scenario<br />

For <strong>IT</strong> baseline protection, the following typical threats are assumed to affect the use of mobile<br />

phones:<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!