19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.74 Manipulation of alias files and distribution<br />

lists<br />

To avoid having to re-enter frequently required e-mail addresses, pseudonyms<br />

can be assigned to these addresses, or distribution lists can be prepared to<br />

allow convenient selection of a large group of recipients. Unauthorised<br />

modification to such pseudonyms and distribution lists can result in a failure<br />

to forward e-mail to the required recipient, or transfer of the e-mail to an<br />

unauthorised recipient. Particularly vulnerable in this case are centrally<br />

maintained pseudonym files and address books.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!