19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.32 Evaluation of residual information in fax<br />

machines and fax servers<br />

Fax machines<br />

Depending on the technology a fax machine uses to store, process and print<br />

information, it may contain varying amounts of residual information after<br />

receiving a fax message. This information can be reconstructed by persons<br />

having access to the fax machine or the relevant components.<br />

In the case of fax machines which use thermo-transfer techniques, incoming<br />

fax messages are first written onto an intermediate foil, which is then used to<br />

print the information. This foil is a consumable and must be replaced<br />

regularly; it is therefore designed to be easily removable. If an unauthorised<br />

person gains possession of this foil (by theft or on disposal) he will be able to<br />

reproduce the contents with a minimum of technical effort. Thus he would be<br />

able to view several hundred pages' worth of information.<br />

Most fax machines have an intermediate memory (document memory, buffer)<br />

in which outgoing faxes can be read until they have been successfully sent and<br />

incoming faxes can be stored temporarily until they have been printed.<br />

Depending on the fax machine, this memory can contain a large number of fax<br />

pages which can usually be printed by anyone who has access to the fax<br />

machine.<br />

Fax server<br />

Fax servers are applications installed on <strong>IT</strong> systems which are generally fitted<br />

with at least one hard disk or can access a disk drive over the network. Fax<br />

transmissions are stored on this until they can be delivered to the recipient.<br />

Modern operating systems also work with swap files which, too, can contain<br />

residual information. <strong>The</strong>re is a danger here that this information can be<br />

evaluated without permission when this fax server is accessed. For example, if<br />

a hard disk fails during the warranty period, it has to be returned to the dealer<br />

or manufacture in order to make a claim under the warranty. However, the<br />

hard disk could still contain data to which unauthorised persons could in this<br />

way obtain access. If the hard disk is faulty, it is often not possible to delete<br />

the data using software tools.<br />

If a workstation or the fax software installed on it is not adequately protected,<br />

it is possible to access fax data on the fax client without authorisation.<br />

<strong>Information</strong> can also be read by unauthorised persons through access to the<br />

workstation's hard disk.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

<strong>The</strong>rmo-transfer printers<br />

Intermediate data<br />

storage in the fax<br />

machine<br />

Residual information on<br />

hard disks<br />

Inadequate protection of<br />

main memory

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!