19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

Example of how the results of prioritisation might appear where ranking is<br />

used:<br />

Damage category Damage /<br />

loss =<br />

medium<br />

Violation of laws, regulations or<br />

contracts<br />

Impairment of the right to<br />

informational self-determination<br />

Impairment of the physical integrity<br />

of a person<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Damage /<br />

loss = high<br />

Damage /<br />

loss = very<br />

high<br />

13 12 11<br />

8 6 3<br />

5 2 1<br />

Impaired performance of duties 15 14 7<br />

Negative effects on external<br />

relationships<br />

17 9 4<br />

Financial consequences 18 16 10<br />

This priority assignment must be approved by Management and put into<br />

effect. <strong>The</strong> approved priority assignment must be notified to all persons who<br />

would need to make decisions in connection with handling security incidents.<br />

In the event that a security incident occurs, the priority assignment is used as<br />

follows. Once the security incident has been investigated and assessed, an<br />

estimate can be made of the expected damage. <strong>The</strong> resulting damage figures<br />

are then assigned to the known damage categories, following which they are<br />

allocated to the classes "medium", "high" and "very high". <strong>The</strong> priority<br />

assignment table indicates the order in which each type of damage should be<br />

addressed. However, the prior assignment of priorities should be viewed only<br />

as an initial guide. It may need to be adapted in individual cases.<br />

Example<br />

Suppose that in the above example, a hacker has succeeded in manipulating<br />

the information on the Internet information server so that the municipal<br />

authority appears in a bad light. This is spotted promptly, <strong>IT</strong> Security<br />

Management is called in and the above damage assessment is carried out. <strong>The</strong><br />

results of the assessment might appear as follows:<br />

Approval by<br />

Management

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!