19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

Furthermore, a manipulation of the connecting path may lead to a rerouting,<br />

to modifications, or to a monitoring of the data packets.<br />

Examples:<br />

A multiport repeater is configured in such a way that only systems with<br />

particular MAC addresses can be connected to certain ports. After the<br />

replacement of a network card on one of the stations and the resulting<br />

change in the MAC address, this system can no longer be connected to the<br />

network (loss of availability).<br />

An unsuitable configuration for active network components (particularly<br />

for VLANs or filtering rules) can expand broadcast-domains to an<br />

unnecessarily large extent and give rise to superfluous network<br />

connections. This could allow confidential data to be viewed by<br />

unauthorised parties.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!