19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.68 Unauthorised access to active network<br />

components<br />

Active network components normally have a serial interface (RS-232) to<br />

which an external terminal or portable PC can be connected. This allows the<br />

active network components to be administered locally as well.<br />

Insufficiently protected interfaces might allow intruders to gain unauthorised<br />

access to network components. After passing local security checks (e.g.<br />

through entry of a password), an intruder might be able to perform all<br />

administrative functions.<br />

By reading the configuration of active network components, the intruder can<br />

gain access to confidential information on the topology, security mechanisms<br />

and utilisation of the network. Configuration data can be read by connecting<br />

an external terminal or portable PC to the serial interface of the active network<br />

component, by accessing the active network component via the local network,<br />

or by viewing the data on a screen or display while the active network<br />

component is being administered or configured.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!