19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.22 <strong>The</strong>ft of a mobile <strong>IT</strong> system<br />

Mobile use of an <strong>IT</strong> system carries the risk of new threats to which stationary<br />

<strong>IT</strong> systems are less exposed. Mobile systems such as laptops are normally not<br />

used in a room secured by protective measures. <strong>The</strong>y are carried in cars or on<br />

public transport, set down in other people's offices during breaks and left<br />

unattended in hotel rooms.<br />

Because of these environmental factors, mobile use of <strong>IT</strong> systems intrinsically<br />

exposes them to a higher risk of theft. It is not totally uncommon for mobile<br />

<strong>IT</strong> systems to be "accidentally" stolen, e.g. there might be a laptop in the boot<br />

of a car that happens to be stolen.<br />

If a mobile <strong>IT</strong> system should be stolen it is also possible that any existing boot<br />

protection (boot/BIOS password) may be surmounted. For <strong>IT</strong> systems which<br />

do not have boot protection but whose protection relies exclusively on the<br />

authentication mechanism of the operating system (user name, password), an<br />

aggressor can access the data on the hard disk by booting up from a diskette or<br />

CD-ROM.<br />

If the mobile <strong>IT</strong> system is integrated into a remote access system and<br />

automatic RAS connection (auto-dial, storage of authentication data) is<br />

enabled, an unauthorised third party could access resources on the destination<br />

LAN.<br />

Example<br />

<strong>The</strong> managing director of a large company had his laptop stolen during a<br />

business trip. <strong>The</strong> material loss was trivial as it was possible to obtain a new<br />

laptop within a day. Far more painful, however, was the loss of important<br />

customer data which had been stored on the laptop. No backup of this<br />

information existed as it had only been entered during the business trip.<br />

Examples of destructive functions of computer viruses<br />

- Every year on March 6th the boot virus Michelangelo overwrites the first<br />

tracks of a hard disk with stochastic material, thus rendering the hard disk<br />

useless.<br />

- <strong>The</strong> multi-partite virus Onehalf encrypts a maximum of half of the contents<br />

of a hard disk. If the virus is removed, the encrypted data becomes<br />

inaccessible.<br />

- <strong>The</strong> Word macro virus WAZZU inserts the word "Wazzu" at random<br />

points in infected documents.<br />

- <strong>The</strong> Word macro virus Melissa appeared on 26 March 1999 and spread all<br />

over the world in the course of the following weekend. This virus is<br />

contained in a Word 97 or Word 2000 file which is sent by an infected<br />

computer via Microsoft Outlook to up to 50 address entries stored in each<br />

address book. In some relatively large organisations the virus completely<br />

overwhelmed the mail system.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Insufficient access<br />

protection<br />

Higher threat potential<br />

with remote access

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!