|
To avoid having to re-enter frequently required e-mail addresses, pseudonyms can be assigned to these addresses, or distribution lists can be prepared to allow convenient selection of a large group of recipients. Unauthorised modification to such pseudonyms and distribution lists can result in a failure to forward e-mail to the required recipient, or transfer of the e-mail to an unauthorised recipient. Particularly vulnerable in this case are centrally maintained pseudonym files and address books.
© Copyright
by Bundesamt für Sicherheit in der Informationstechnik |
last update: July 1999 |