19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.25 Masquerading<br />

Masquerading is used by an aggressor to assume a false identity. Thus he can<br />

obtain a false identity by spying out the user ID and password (cf. T 5.9 -<br />

Unauthorised use of <strong>IT</strong> systems) or by manipulating the originator field of a<br />

message or the I/O address within the network. Other ways of obtaining a<br />

false identity are to manipulate the calling number display (Calling Line<br />

Identification Presentation) on an ISDN line or the originator identifier of a<br />

fax originator (CSID - Call Subscriber ID)<br />

A user who believes he is communicating with a different person can be easily<br />

induced to disclose sensitive information.<br />

An aggressor can also use masquerading to try to connect to an existing<br />

connection without having to authenticate himself, as this step has already<br />

been taken by the original participants in the communication.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Manipulation of the<br />

originator field or I/O<br />

address<br />

Intruding on an existing<br />

connection

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!