19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.81 Unauthorised use of a cryptomodule<br />

If a third person succeeds in using a cryptomodule without authorisation, this<br />

can lead to various types of damage. Examples of such damage include:<br />

- While using the cryptomodule without authorisation, a perpetrator may<br />

manage to read secret codes, alter the codes or even manipulate vital<br />

security parameters. This would mean that the cryptographic process no<br />

longer offers sufficient security.<br />

- While using the cryptomodule without authorisation, the perpetrator may<br />

manipulate the cryptomodule in such a way that it appears to be working<br />

correctly at first sight but is actually in an insecure state.<br />

- <strong>The</strong> perpetrator may use the cryptomodule in the form of a masquerade. If<br />

the perpetrator signs or encodes data while using the cryptomodule without<br />

authorisation, this is interpreted by the recipient of the data as if it had been<br />

done by the authorised user.<br />

Example:<br />

It is possible to use a cryptomodule without authorisation if users briefly leave<br />

their workplace while the cryptomodule is able to operate and not protected<br />

against unauthorised access. This is the case, for instance, if a signature chip<br />

card or encoding chip card is left in the computer. In this way, anyone who<br />

happens to go by can sign E-mails in the name of the usual user or encode<br />

files stored in the <strong>IT</strong> system in such a way that the user can no longer use<br />

them.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!