HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual T 5.72 Misuse of e-mail services

T 5.72 Misuse of e-mail services

Misuse of e-mail systems can take place at a variety of stages: at the sending workstation, within an Intranet, on a mail server or at a receiving workstation.

If access to a user's e-mail program or an organisation's e-mail system is not adequately protected, unauthorised persons might be able to manipulate these IT systems. The resulting, unnecessary transmission expenses might also be accompanied by damage caused through the impersonation of an authorised user.

Similarly, unauthorised persons must be prevented from reading e-mail. Confidential information could thus be disclosed, lose its value or be exploited to the detriment of the recipient.

Examples:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
July 1999