19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 2.54 Loss of confidentiality through hidden pieces<br />

of data.<br />

During electronic data communication or transmission of data media,<br />

information that should not leave the institution is frequently passed. <strong>The</strong><br />

possible reasons for an inadvertent transfer of information are listed below: .<br />

- A file contains some pieces of text formatted in a hidden or non visible<br />

mode. Such pieces of text can include statements, which are not addressed<br />

to a recipient.<br />

- Files created with standard software, including text processor or<br />

spreadsheet programs can contain additional information such as the<br />

structure of directories, version numbers, creator, modification time stamp,<br />

last time of printing, document name and document descriptions.<br />

- If a file is copied to a floppy disk, an entire physical memory block will be<br />

filled. If the original file does not require a complete memory block , the <strong>IT</strong><br />

system fills up the unused section of the block with discretionary ‘hidden’<br />

data.<br />

- All current releases of Winword offer the possibility of using the ‘quicksaving’<br />

option for all created documents This ensures only that the<br />

modifications of a document will be saved. This takes less time as<br />

compared to a complete saving procedure, in which Winword has to save a<br />

completely modified file . However, a complete saving procedure requires<br />

less storage on the hard disk than does a ‘quick-save’ procedure. <strong>The</strong><br />

decisive disadvantage, however, is the fact that a file can contain textual<br />

fragments which were not foreseen for distribution by the author.<br />

Examples:<br />

- Due to the use of a different editor, a user accidentally discovered several<br />

URLs, followed by a user name and a password from a file which was<br />

ready and prepared for sending. <strong>The</strong> address of a WWW-document is<br />

called URL (Uniform Request Locator). <strong>The</strong> access to a WWW-page can<br />

be password-protected<br />

- Presentation slides built with Microsoft Powerpoint were handed over as<br />

files to a third party by a public authority. Later it was detected, that it was<br />

not only the presentation slides, but that it also included information about<br />

the user environment, such as information about the newsgroup subscribed<br />

to by the user and which articles from the newsgroups he had already read.<br />

Among other things the PowerPoint file contained the following entries:<br />

alt.drugs! s21718 0<br />

alt.sex s125 0<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!