HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual T 2.37 Uncontrolled usage of communications lines

T 2.37 Uncontrolled usage of communications lines

During the use of communications cards in an IT system (fax, modem or ISDN cards), it is not always clearly evident whether any further data is also transmitted in addition to the user and protocol data. Once activated, a communications card is generally able to establish a connection to an undesired terminal, without any user activity. In addition, third parties may have access to remote functions which are not known to the user.

Examples:

.
© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
 
home