19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.24 Replay of messages<br />

In this form of attack, an aggressor records a message and replays it<br />

unchanged at a later time.<br />

Examples<br />

- An adversary records the authentication data (e.g. user ID and<br />

password) during a user's logon dialogue and uses this information to<br />

obtain access to a system by feigning a false identity (see also T 5.21 -<br />

Trojan horses).<br />

- An employee places an authorised order several times with the intention<br />

of causing financial loss to his employer.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!