19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Networked Systems <strong>IT</strong>-Security Management<br />

_________________________________________________________________________________________<br />

Force Majeure<br />

- T 1.1 Loss of personnel<br />

- T 1.2 Failure of the <strong>IT</strong> system<br />

- T 1.4 Fire<br />

- T 1.5 Water<br />

- T 1.8 Dust, soiling<br />

Organisational shortcomings:<br />

- T 2.1 Lack of, or insufficient, rules<br />

- T 2.7 Unauthorised use of rights<br />

- T 2.9 Poor adjustment to changes in the use of <strong>IT</strong><br />

- T 2.21 Inadequate organisation of the exchange of users<br />

- T 2.22 Lack of evaluation of auditing data<br />

- T 2.36 Inappropriate restriction of user environment<br />

Human Failure:<br />

- T 3.2 Negligent destroying of equipment or data<br />

- T 3.3 Non-compliance with <strong>IT</strong> security measures<br />

- T 3.6 Hazards posed by cleaning staff or outside staff<br />

- T 3.8 Improper use of the <strong>IT</strong> system<br />

- T 3.16 Incorrect administration of site and data access rights<br />

- T 3.22 Improper modification of the registry<br />

Technical Failure:<br />

- T 4.1 Disruption of power supply<br />

- T 4.7 Defective data media<br />

- T 4.23 Automatic CD-ROM-recognition<br />

- T 4.24 File name conversion when backing up data under Windows 95<br />

Deliberate Acts:<br />

- T 5.1 Manipulation/destruction of <strong>IT</strong> equipment or accessories<br />

- T 5.2 Manipulation of data or software<br />

- T 5.4 <strong>The</strong>ft<br />

- T 5.9 Unauthorised use of <strong>IT</strong> systems<br />

- T 5.21 Trojan Horses<br />

- T 5.23 Computer viruses<br />

- T 5.43 Macro viruses<br />

- T 5.60 By-passing system guidelines<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!