IT Baseline Protection Manual T 5.8 Manipulation of lines
T 5.8 Manipulation of lines
Apart from the interception of lines (cf. T 5.7 Interception of lines), manipulation of lines may have other objectives as well:
Frustrated staff members could manipulate lines in such a way that inadmissible connections would be established within and outside the organisation's own IT set-up. Often, the aim would be to merely disrupt IT operations.
Lines could be manipulated in such a way that private use would be at the expense of the network provider. Apart from the resultant costs regarding the use of chargeable communication lines, lines and resources would be blocked by such private use.
As a result of the manipulation of lines, it might become possible for data transmitted by them to be modified to an offender's advantage. Manipulation can cause particularly great damage in processes relevant to accounting, in payroll accounting, and in the context of all IT applications which directly or indirectly refer to the management of material assets