19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.33 Impersonation of wrong sender on fax<br />

transmissions<br />

Similar to writing letters using a false name and letterhead, it is possible to<br />

send faked fax messages. This can cause damage if the recipient assumes that<br />

the information is authentic and thus legally binding (c.f. T 3.14 Incorrect<br />

assessment of the legal force of a fax).<br />

Examples<br />

- Signatures can be scanned in from other signed documents and printed out<br />

onto the fax template or copied into the fax as a graphic file when the fax<br />

server is used. On the fax received a signature reproduced in this way looks<br />

no different from an authentic signature.<br />

- <strong>The</strong> call number of the transmitting fax connection is generally sent during<br />

the transmission. It is possible, however, to feign a different call number.<br />

<strong>The</strong> reception logs should not therefore be viewed as a reliable proof of the<br />

identity of the sender.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!