19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 3.45 Inadequate checking of the identity of<br />

communication partners<br />

During personal conversations, on the phone or using e-mail, many people are<br />

prepared to pass on a lot more information than they would do in writing or if<br />

they had a larger audience. Often it is tacitly assumed that the communication<br />

partner will treat the content of the conversation or e-mail as confidential.<br />

<strong>The</strong>re is also a disinclination to enquire as to the identity of a caller as this will<br />

appear impolite. <strong>The</strong> same considerations deter people from querying the<br />

reason for the call or enquiring as to the person on whose behalf the caller is<br />

ringing ("I work for XY Bank and need some detailed information on your<br />

income level.") Such behavioural patterns can be exploited through "social<br />

engineering" (see also T 5.42 Social engineering).<br />

Example:<br />

<strong>The</strong>re are many cases known in which journalists have phoned up important<br />

people and pretended to be other important people. In this way they have<br />

succeeded in obtaining information from celebrities or public figures which<br />

was not intended for the public. This has proved to be dynamite where the<br />

information was transmitted directly over the radio so that it was not possible<br />

to reverse publication.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Thoughtless disclosure<br />

of internal information

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!