19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 3.15 Improper use of answering machines<br />

<strong>The</strong>re is a risk of the incorrect use of an answering machine. Some answering<br />

machines are fundamentally prone to incorrect use; because they have<br />

function keys with double or even triple assignments for example. This<br />

problem is compounded by the keys being so small and close together that<br />

incorrect handling becomes almost inevitable.<br />

It may happen that an answering machine will ignore incoming calls as a<br />

result of incorrect use. This could happen, for example, if the machine is<br />

turned off or the outgoing message is deleted inadvertently by the pressing of<br />

a button.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!