19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Non-Networked Systems and Clients<br />

_________________________________________________________________________________________<br />

4.5 Working place at home<br />

(Telecommuting)<br />

Description<br />

If professional tasks are performed at home instead of a<br />

company or institute, appropriate measures must be taken to<br />

achieve a degree of security comparable with that prevailing<br />

on office premises. A home environment does not normally<br />

provide the security infrastructure present on the premises of<br />

a company or institute. Visitors and family members often<br />

have access to a home workstation. This chapter describes the threats and safeguards pertaining<br />

typically to home workstations. Such a workstation can be used, for example, by regular employees<br />

for the purpose of telecommuting, as well as by freelancers and self-employed people.<br />

Threat Scenario<br />

<strong>The</strong> following typical threats are assumed as regards <strong>IT</strong> baseline protection of a working place at<br />

home:<br />

Force Majeure<br />

- T 1.4 Fire<br />

- T 1.5 Water<br />

Organisational shortcomings:<br />

- T 2.1 Lack of, or insufficient, rules<br />

- T 2.6 Unauthorised admission to rooms requiring protection<br />

- T 2.14 Impairment of <strong>IT</strong> usage on account of adverse working conditions<br />

- T 2.47 Insecure transport of files and data media<br />

- T 2.48 Inadequate disposal of data media and documents at the home work place<br />

Human Failure:<br />

- T 3.6 Hazards posed by cleaning staff or outside staff<br />

Deliberate Acts:<br />

- T 5.1 Manipulation/destruction of <strong>IT</strong> equipment or accessories<br />

- T 5.2 Manipulation of data or software<br />

- T 5.3 Unauthorised entry into a building<br />

- T 5.69 Higher risk of theft from a working place at home<br />

- T 5.70 Manipulation by family members or visitors<br />

- T 5.71 Loss of confidentiality of classified information<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!