19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.94 Misuse of cards<br />

Loss and theft of mobile phones are everyday occurrences. In addition to loss<br />

of the phone itself, this can result in further financial loss. If an unauthorised<br />

person gains possession of a SIM card (e.g. because he finds it or steals it), he<br />

can make calls at the expense of the genuine cardholder as long as he knows<br />

the PIN or can guess it easily.<br />

Data such as telephone directories or short messages which are stored on the<br />

mobile phone or SIM card may well be of a confidential nature. Loss of the<br />

mobile phone or card may then mean disclosure of this stored information.<br />

<strong>The</strong>re have been instances in the past where the cryptographic security<br />

mechanisms of the SIM cards provided by some network providers have<br />

proved too weak. This meant it was possible to make copies of these network<br />

providers’ SIM cards. However, to do this, the adversary must have the<br />

original card. He also needs the PIN or, alternatively, the requirement to enter<br />

the PIN must be deactivated in order that the IMSI can be read.<br />

Such an attack can easily be prevented and detected by private users.<br />

However, where a number of different people have access to the same mobile<br />

phone it is possible for such an attack to be carried out and only noticed long<br />

after the event. For example, this affects mobile phones from a pool or<br />

companies which hire out mobile phones.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!