19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Non-Networked Systems and Clients<br />

_________________________________________________________________________________________<br />

5.1 DOS PC (single user)<br />

Description<br />

<strong>The</strong> subject here is a commercially available IBM-compatible<br />

PC run with DOS or a comparable operating system. Such a<br />

PC must not be connected to a local area network. It is<br />

equipped with a floppy disk drive, a hard disk and, optionally,<br />

a mouse. If available, a printer is to be directly connected to<br />

the PC. A graphic user interface can also be employed here.<br />

<strong>The</strong> following is based on the assumption that such a PC will<br />

be operated by a single user.<br />

Threat Scenario<br />

<strong>The</strong> following threats (T) are assumed for <strong>IT</strong> baseline protection of a DOS PC (Single User):<br />

Force Majeure<br />

- T 1.1 Loss of personnel<br />

- T 1.2 Failure of the <strong>IT</strong> system<br />

- T 1.4 Fire<br />

- T 1.5 Water<br />

- T 1.8 Dust, soiling<br />

Human Failure:<br />

- T 3.2 Negligent destroying of equipment or data<br />

- T 3.3 Non-compliance with <strong>IT</strong> security measures<br />

- T 3.6 Hazards posed by cleaning staff or outside staff<br />

- T 3.8 Improper use of the <strong>IT</strong> system<br />

Technical Failure:<br />

- T 4.1 Disruption of power supply<br />

- T 4.7 Defective data media<br />

Deliberate Acts:<br />

- T 5.1 Manipulation/destruction of <strong>IT</strong> equipment or accessories<br />

- T 5.2 Manipulation of data or software<br />

- T 5.4 <strong>The</strong>ft<br />

- T 5.9 Unauthorised use of <strong>IT</strong> systems<br />

- T 5.23 Computer viruses<br />

- T 5.43 Macro viruses<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!