19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.34 Deliberate re-programming of the destination<br />

keys on fax machines<br />

To avoid the repetetive input of recurring fax numbers, some fax machines are<br />

equipped with programmable destination keys. During the transmission of fax<br />

messages to such recipients, the stored destination number is usually not<br />

checked. If unauthorised persons are able to re-program the destination keys<br />

and promptly forward the fax messages arriving at the new destination to the<br />

correct recipient, all fax traffic along this route can be monitored easily,<br />

perhaps without ever being detected.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!