S 4.251 Working with external IT systems

Initiation responsibility: User, Supervisor, IT Security Officer

Implementation responsibility: User

It is often necessary to be able to access different types of electronic information when travelling, e.g. to synchronise calendars, send e-mails and retrieve certain files. Often, the easiest way to do this is by using external IT systems or communication connections, e.g.

It should be clear to all users that this IT is administrated by third parties and that additional security safeguards must therefore be implemented. One should always assume that the security level of the foreign environment is unknown and must therefore be judged as low. All employees should be aware that external computers and foreign environments always pose higher IT security risks. Even if the level of security makes an excellent impression, this could be a misapprehension.

For example, the existing network environment could be protected more poorly than one's own laptop, so that problems such as computer viruses or Trojan horses could be imported. It may turn out that at the organisation visited, a totally different understanding of security prevails, so that there is no consensus on security objectives, the security level and security safeguards.

It can occur in mobile networks that the network participants constantly change, meaning that new ones are included in and others leave the network. In this case it is difficult to trace which persons were also active in the network at a given point in time. Therefore, mobile networks are prone to attacks that may not even be traceable and it is extremely difficult to make any type of judgement regarding the existing security level.

Before users log on to external networks or make use of service offers, they should consider how trustworthy they are. Extremely reasonable offers could very well be provided for the sake of spying out or manipulating data on mobile terminal devices. For example, an attacker could provide free Internet access or WLAN access in order to easily read the data transmitted from there.

Even when using comparatively simple and comprehensible services, users must take the necessary care. It could become necessary when travelling to print out data from the laptop, for example. Printing services in hotels, Internet cafés or copy shops or the printers at the company being visited can be used. However, the printed information is thus made accessible to external persons, namely the respective service providers. The file to be printed must be transmitted to the printer and is thus possibly cached on IT systems. Printouts can be made several times without being noticed, or paper can simply remain in the printer.

For this reason, users should take the following recommendations into account before working on external IT systems or using service offers:

Review questions: