19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.30 Unauthorised use of a fax machine or fax<br />

server<br />

Unauthorised access to a fax machine or fax server can be exploited for<br />

manipulative purposes. On top of the cost of fax transmissions (charges and<br />

consumables), loss or damage could also result from an unauthorised person<br />

using the device under false pretences (sending out letters bearing the<br />

company letterhead from the corresponding fax connection).<br />

Steps must also be taken to ensure that unauthorised persons cannot access<br />

incoming fax transmissions.<br />

Examples<br />

- A fax machine is situated in the corridor so that anybody walking by can<br />

read or help himself to faxes unchecked.<br />

- <strong>The</strong> access authorisations to stored fax data on a fax server are set<br />

incorrectly so that unauthorised persons can read other people' faxes.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!