19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Non-Networked Systems and Clients <strong>IT</strong>-Security Management<br />

_________________________________________________________________________________________<br />

Force Majeure<br />

- T 1.1 Loss of personnel<br />

- T 1.2 Failure of the <strong>IT</strong> system<br />

- T 1.4 Fire<br />

- T 1.5 Water<br />

- T 1.8 Dust, soiling<br />

Organisational shortcomings:<br />

- T 2.7 Unauthorised use of rights<br />

- T 2.9 Poor adjustment to changes in the use of <strong>IT</strong><br />

- T 2.31 Inadequate protection of the Windows NT system<br />

Human Failure:<br />

- T 3.2 Negligent destroying of equipment or data<br />

- T 3.3 Non-compliance with <strong>IT</strong> security measures<br />

- T 3.6 Hazards posed by cleaning staff or outside staff<br />

- T 3.8 Improper use of the <strong>IT</strong> system<br />

- T 3.9 Improper <strong>IT</strong> system administration<br />

Technical Failure:<br />

- T 4.1 Disruption of power supply<br />

- T 4.7 Defective data media<br />

- T 4.8 Discovery of software vulnerabilities<br />

- T 4.23 Automatic CD-ROM-recognition<br />

Deliberate Acts:<br />

- T 5.1 Manipulation/destruction of <strong>IT</strong> equipment or accessories<br />

- T 5.2 Manipulation of data or software<br />

- T 5.4 <strong>The</strong>ft<br />

- T 5.9 Unauthorised use of <strong>IT</strong> systems<br />

- T 5.18 Systematic trying-out of passwords<br />

- T 5.21 Trojan Horses<br />

- T 5.23 Computer viruses<br />

- T 5.43 Macro viruses<br />

- T 5.52 Misuse of administrator rights in Windows NT systems<br />

- T 5.79 Unauthorised acquisition of administrator rights under Windows NT<br />

Recommended Countermeasures (S)<br />

For the implementation of <strong>IT</strong> baseline protection, selection of the required packages of safeguards<br />

("modules") as described in chapters 2.3 and 2.4, is recommended.<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!