19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.97 Unauthorised transfer of data over mobile<br />

phones<br />

Mobile phones provide the means whereby data from one <strong>IT</strong> system, e.g. a PC<br />

or notebook, can be transported to another without a cable connection having<br />

to be established between the two devices.<br />

<strong>Information</strong> can then be surreptitiously retrieved and transmitted in a place<br />

where <strong>IT</strong> systems can be accessed openly. If a mobile phone is connected to a<br />

modem or has an in-built modem, information held on a computer can be<br />

transmitted to virtually anywhere in the world wire-free.<br />

This type of unauthorised data transfer can be performed either with a mobile<br />

phone that has been specially brought along for the purpose or even using an<br />

internal mobile phone. In this way large quantities of data can be passed to the<br />

outside world unnoticed. Existing bandwidth limitations which currently make<br />

the transmission of large quantities of data unattractive are likely to disappear<br />

over the next few years as new technologies come on stream. With GSM the<br />

maximum data transfer rate is currently 9600 bps, whereas next generation<br />

protocols (GPRS, UMTS) envisage significantly higher transfer rates.<br />

Nor is it always possible to check afterwards whether such data transmission<br />

has occurred as the network provider's record of the call data may already<br />

have been deleted.<br />

Example:<br />

- An employee of one company is called out of a meeting with an outside<br />

party so that he can take an important phone call. <strong>The</strong> external party uses<br />

the brief interval during which he is alone in the meeting room to link up<br />

the PC installed there with his GSM modem. He then initiates a data<br />

transfer to a connection of his choice.<br />

- Where remote access services are used over mobile phone networks, often<br />

the Calling Line Identification Presentation (CLIP) mechanism is used as<br />

an authentication feature. If the mobile phone is stolen or lost, the<br />

authentication procedure will no longer function properly. Although<br />

normally a PIN has to be entered when a mobile phone is switched on,<br />

most people leave their phones switched on. If the telephone is already<br />

switched on when it is stolen, then theoretically it can be used immediately<br />

by a third party. If the battery is re-charged in time, the point at which the<br />

phone cuts out due to lack of power can be deferred and hence the need to<br />

input the PIN because the phone has been switched on again.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!