19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.72 Misuse of e-mail services<br />

Misuse of e-mail systems can take place at a variety of stages: at the sending<br />

workstation, within an Intranet, on a mail server or at a receiving workstation.<br />

If access to a user's e-mail program or an organisation's e-mail system is not<br />

adequately protected, unauthorised persons might be able to manipulate these<br />

<strong>IT</strong> systems. <strong>The</strong> resulting, unnecessary transmission expenses might also be<br />

accompanied by damage caused through the impersonation of an authorised<br />

user.<br />

Similarly, unauthorised persons must be prevented from reading e-mail.<br />

Confidential information could thus be disclosed, lose its value or be exploited<br />

to the detriment of the recipient.<br />

Examples:<br />

- A department head briefly left his office with the <strong>IT</strong> system unlocked, the<br />

mail software on it still active, and user authentication already having been<br />

performed. A colleague who happened to pass by the office then played<br />

what he considered to be a great practical joke by using the department<br />

head's ID to send other colleagues "letters of notice" or work orders.<br />

- An employee uses his own business e-mail account to disseminate private<br />

opinions which could damage the reputation of his employer.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!