19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.11 Loss of confidentiality of data stored within<br />

PBX installations<br />

Within PBX installations, personal and in-house data are stored on hard disks<br />

for a prolonged period of time. In this case, personal data are: charging<br />

infomation, configuration data, privileges and, in instances, data for electronic<br />

telephone directories, passwords and job account numbers.<br />

Such data can be read and modified by the administration staff. <strong>The</strong> nature and<br />

extension of such tampering depends on the type of the given installation and,<br />

where provided for, on the granting of rights. Administration staff have this<br />

possibility both at the site and through remote maintenance. In case of external<br />

remote maintenance, the person entrusted with this task (normally the<br />

manufacturer) has this possibility at any time!<br />

<strong>The</strong> hard disks are often taken to the PBX manufacturers for an upgrade of<br />

system software. This means that personal data can be read by the respective<br />

manufacturer.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!