19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 2.37 Uncontrolled usage of communications lines<br />

During the use of communications cards in an <strong>IT</strong> system (fax, modem or<br />

ISDN cards), it is not always clearly evident whether any further data is also<br />

transmitted in addition to the user and protocol data. Once activated, a<br />

communications card is generally able to establish a connection to an<br />

undesired terminal, without any user activity. In addition, third parties may<br />

have access to remote functions which are not known to the user.<br />

Examples:<br />

- While configuring a fax card for the first time, the user is prompted by the<br />

installation program to enter the country code for Sweden.. This could<br />

imply that the manufacturer of the card wants information on the use of<br />

his/her product, possibly for marketing reasons.<br />

- A large number of modem cards support remote access to <strong>IT</strong> systems.<br />

Although such access can be protected by certain mechanisms, some of<br />

which are integrated in the cards themselves (call-back option and callnumber<br />

authentication), the related default settings, however, have not<br />

been made. An <strong>IT</strong> system configured like that can therefore be completely<br />

manipulated at will by external parties via the modem card.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!