T 5.66 Unauthorised connection of IT systems to a network

In principle, the unauthorised connection of an IT system to an existing network (by connecting to the existing cables or using the interfaces in the technical infrastructure rooms or offices) cannot be prevented. There is no cabling design that could prevent this type of connection. Cabling designs differ solely with regard to the time and effort required to connect to the cables and to read or upload data.

The unauthorised integration of a computer into a network is often very difficult to detect, and usually goes unnoticed. This type of access concerns the entire network traffic taking place in the affected segment and can facilitate the following activities, for example: