19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

- A general danger found when administration is inadequate is that hardware<br />

or software components used for communication, upon which the RAS<br />

connections rely, are configured either incorrectly or so that they are<br />

incompatible. Incorrect configuration can range here from incorrect<br />

security settings through to incompatible communication protocols. <strong>The</strong><br />

consequences of incorrect configuration are just as diverse, for example,<br />

users are unable to log on when they need to or unauthorised third parties<br />

can successfully establish a connection.<br />

Examples<br />

- An employee working out in the field regularly uses the replication<br />

mechanism of a groupware product to update his local copy of a technical<br />

reference database. Because the replication mechanism is incorrectly<br />

configured, replication is always initiated after the RAS connection has<br />

been established so that connection using a mobile phone modem always<br />

appears to "hang" after successful logon.<br />

- A company uses a software management system which regularly installs<br />

new software updates on the individual users’ computers. Due to a<br />

configuration error, the mobile RAS clients are included in this procedure.<br />

After a connection has been successfully established, the entire bandwidth<br />

is then taken up by the management software attempting to install a<br />

substantial update package on the computer.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Incorrectly configured<br />

components for<br />

communication

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!