HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual T 5.81 Unauthorised use of a cryptomodule

T 5.81 Unauthorised use of a cryptomodule

If a third person succeeds in using a cryptomodule without authorisation, this can lead to various types of damage. Examples of such damage include:

Example:

It is possible to use a cryptomodule without authorisation if users briefly leave their workplace while the cryptomodule is able to operate and not protected against unauthorised access. This is the case, for instance, if a signature chip card or encoding chip card is left in the computer. In this way, anyone who happens to go by can sign E-mails in the name of the usual user or encode files stored in the IT system in such a way that the user can no longer use them.


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
July 1999
home