19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.31 Unauthorised reading of incoming fax transmissions<br />

T 5.32 Evaluation of residual information in fax machines<br />

T 5.33 Impersonation of wrong sender on fax machines<br />

T 5.34 Deliberate re-programming of the destination keys on<br />

fax machines<br />

T 5.35 Overload due to incoming fax transmissions<br />

T 5.36 Deliberate overloading of answering machines<br />

T 5.37 Determining access codes<br />

T 5.38 Misuse of remote inquiry<br />

T 5.39 Infiltrating computer systems via communication cards<br />

T 5.40 Monitoring rooms using computers equipped with<br />

microphones<br />

T 5.41 Misuse of a UNIX system with the help of uucp<br />

T 5.42 Social engineering<br />

T 5.43 Macro viruses<br />

T 5.44 Abuse of Remote Access Ports for Management<br />

Functions of Private Branch Exchanges<br />

T 5.45 Trying Out Passwords under WfW and Windows 95<br />

T 5.46 Masquerading under WfW<br />

T 5.47 Deleting the Post Office<br />

T 5.48 IP Spoofing<br />

T 5.49 Abuse of Source Routing<br />

T 5.50 Abuse of the ICMP Protocol<br />

T 5.51 Abuse of routing protocols<br />

T 5.52 Misuse of administrator rights in Windows NT systems<br />

T 5.53 Deliberate misuse of protective cabinets for reasons of<br />

convenience<br />

T 5.54 Deliberately causing an Abnormal End<br />

T 5.55 Login Bypass<br />

T 5.56 Temporary free-access accounts<br />

T 5.57 Network analysis tools<br />

T 5.58 Hacking Novell Netware<br />

T 5.59 Misuse of administrator rights in the Novell Netware<br />

network 3.x<br />

T 5.60 By-passing system guidelines<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!