19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.76 Mail bombs<br />

Mail bombs are e-mails containing functions intended to disrupt <strong>IT</strong> systems.<br />

Functions like this are usually integrated into e-mail attachments. On being<br />

opened for the purpose of reading, such an attachment generates countless<br />

subdirectories or occupies a lot of hard disk space, for example. In many<br />

cases, the selective overloading of e-mail addresses by messages with usually<br />

unintelligible contents is also termed mail bombing (refer to T 5.75 Overload<br />

due to incoming e-mails).<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!