19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Other <strong>IT</strong> Components Mobile Telephones<br />

_________________________________________________________________________________________<br />

Organisational Shortcomings:<br />

- T 2.2 Insufficient knowledge of requirements documents<br />

- T 2.4 Insufficient monitoring of <strong>IT</strong> security measures<br />

- T 2.7 Unauthorised use of rights<br />

Human Error:<br />

- T 3.3 Non-compliance with <strong>IT</strong> security measures<br />

- T 3.43 Inappropriate handling of passwords<br />

- T 3.44 Carelessness in handling information<br />

- T 3.45 Inadequate checking of the identity of communication partners<br />

Technical Failures:<br />

- T 4.41 Non-availability of the mobile communication network<br />

- T 4.42 Failure of the mobile phone<br />

Deliberate Acts:<br />

- T 5.2 Manipulation of data or software<br />

- T 5.4 <strong>The</strong>ft<br />

- T 5.80 Hoaxes<br />

- T 5.94 Misuse of cards<br />

- T 5.95 Bugging of indoor conversations over mobile phones<br />

- T 5.96 Tampering with mobile phones<br />

- T 5.97 Unauthorised transfer of data over mobile phones<br />

- T 5.98 Interception of mobile telephone calls<br />

- T 5.99 Analysis of call data relating to the use of mobile phones<br />

Recommended Countermeasures<br />

To implement <strong>IT</strong> baseline protection, selection of the required packages of safeguards ("modules") is<br />

recommended, as described in Sections 2.3 and 2.4.<br />

In order to be able to use mobile phones securely and effectively, the use of mobile phones should be<br />

regulated within the organisation from the outset and security guidelines should be drawn up on the<br />

subject (see S 2.188).<br />

<strong>The</strong> detailed package of safeguards which has been prepared for the use of mobile phones is<br />

summarised below.<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!