19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.26 Analysis of the message flow<br />

By a traffic flow analysis, a perpetrator tries to find out who, at what time and<br />

how often, has sent what data volumes to whom. Even if an eavesdropper<br />

cannot read the contents of the message, it is possible to draw conclusions<br />

about the behaviour of users. <strong>The</strong> information regarding the date and time a<br />

message is created can be analysed to a personality profile of the sender.<br />

Address collectors from address companies also search for e-mail and postal<br />

addresses to which unsolicited advertising can be sent.<br />

Within ISDN (Integrated Services Digital Network), the D-channel of a<br />

connection, used for signalling between terminal devices and the exchange, is<br />

particularly vulnerable to intrusions. An analysis of the signalling by a<br />

protocol sniffer not only allows the drawing of conclusions about the<br />

behaviour of a user (e.g. who phones when, to whom, and for how long?), but<br />

also can be used to prepare more complex attacks via the D-channel.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!