19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Non-Networked Systems and Clients <strong>IT</strong>-Security Management<br />

_________________________________________________________________________________________<br />

Force Majeure<br />

- T 1.1 Loss of personnel<br />

- T 1.2 Failure of the <strong>IT</strong> system<br />

- T 1.4 Fire<br />

- T 1.5 Water<br />

- T 1.8 Dust, soiling<br />

Organisational shortcomings<br />

- T 2.7 Unauthorised use of rights<br />

- T 2.9 Poor adjustment to changes in the use of <strong>IT</strong><br />

- T 2.15 Loss of confidentiality of sensitive data in the UNIX system<br />

Human Failure<br />

- T 3.2 Negligent destruction of equipment or data<br />

- T 3.3 Non-compliance with <strong>IT</strong> security measures<br />

- T 3.5 Inadvertent damaging of cables<br />

- T 3.6 Hazards posed by cleaning staff or outside staff<br />

- T 3.8 Improper use of the <strong>IT</strong> system<br />

- T 3.9 Improper <strong>IT</strong> system administration<br />

Technical Failure<br />

- T 4.1 Disruption of power supply<br />

- T 4.6 Voltage variations / overvoltage / undervoltage<br />

- T 4.7 Defective data media<br />

- T 4.8 Discovery of software vulnerabilities<br />

- T 4.11 Lack of authentication possibilities between NIS Server and NIS Client<br />

- T 4.12 Lack of authentication possibilities between X Server and X Client<br />

Deliberate Acts<br />

- T 5.1 Manipulation or destruction of <strong>IT</strong> equipment or accessories<br />

- T 5.2 Manipulation of data or software<br />

- T 5.4 <strong>The</strong>ft<br />

- T 5.7 Line tapping<br />

- T 5.8 Manipulation of lines<br />

- T 5.9 Unauthorised use of <strong>IT</strong> systems<br />

- T 5.18 Systematic trying-out of passwords<br />

- T 5.19 Abuse of user rights<br />

- T 5.20 Abuse of Administrator rights<br />

- T 5.21 Trojan horses<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!