19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Networked Systems Server-Supported Network<br />

_________________________________________________________________________________________<br />

Force Majeure<br />

- T 1.1 Loss of personnel<br />

- T 1.2 Failure of the <strong>IT</strong> system<br />

- T 1.4 Fire<br />

- T 1.5 Water<br />

- T 1.8 Dust, soiling<br />

Organisational Shortcomings:<br />

- T 2.7 Unauthorised use of rights<br />

- T 2.9 Poor adjustment to changes in the use of <strong>IT</strong><br />

- T 2.32 Inadequate line bandwidth<br />

Human Error:<br />

- T 3.2 Negligent destruction of equipment or data<br />

- T 3.3 Non-compliance with <strong>IT</strong> security measures<br />

- T 3.5 Inadvertent damaging of cables<br />

- T 3.6 Hazards posed by cleaning staff or outside staff<br />

- T 3.8 Improper use of the <strong>IT</strong> system<br />

- T 3.9 Improper <strong>IT</strong> system administration<br />

- T 3.31 Unstructured data organisation<br />

Technical Failure:<br />

- T 4.1 Disruption of power supply<br />

- T 4.6 Voltage variations / overvoltage / undervoltage<br />

- T 4.7 Defective data media<br />

- T 4.8 Discovery of software vulnerabilities<br />

- T 4.10 Complexity of access possibilities to networked <strong>IT</strong> systems<br />

Deliberate Acts:<br />

- T 5.1 Manipulation or destruction of <strong>IT</strong> equipment or accessories<br />

- T 5.2 Manipulation of data or software<br />

T 5.4 <strong>The</strong>ft<br />

- T 5.7 Line tapping<br />

- T 5.8 Manipulation of lines<br />

- T 5.9 Unauthorised use of <strong>IT</strong> systems<br />

- T 5.18 Systematic trying-out of passwords<br />

- T 5.19 Abuse of user rights<br />

- T 5.20 Abuse of Administrator rights<br />

- T 5.21 Trojan horses<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!