19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Data Transmission Systems E-Mail<br />

_________________________________________________________________________________________<br />

Organisational shortcomings:<br />

- T 2.7 Unauthorised use of rights<br />

- T 2.9 Poor adjustment to changes in the use of <strong>IT</strong><br />

- T 2.19 Inadequate encryption key management<br />

- T 2.54 Loss of confidentiality through hidden pieces of data.<br />

- T 2.55 Uncontrolled use of electronic mail<br />

- T 2.56 Inadequate description of files<br />

Human Failure:<br />

- T 3.1 Loss of data confidentiality/integrity as a result of <strong>IT</strong> user error<br />

- T 3.3 Non-compliance with <strong>IT</strong> security measures<br />

- T 3.8 Improper use of the <strong>IT</strong> system<br />

- T 3.13 Transfer of incorrect or undesired data records<br />

Technical Failure:<br />

- T 4.20 Data loss due to exhausting storage medium<br />

- T 4.32 Failure to dispatch a message<br />

- T 4.37 Lack of time authenticity in E-mail<br />

Deliberate Acts:<br />

- T 5.2 Manipulation of data or software<br />

- T 5.7 Interception of lines<br />

- T 5.9 Unauthorised use of <strong>IT</strong> systems<br />

- T 5.21 Trojan Horses<br />

- T 5.23 Computer viruses<br />

- T 5.24 Replay of messages<br />

- T 5.25 Masquerade<br />

- T 5.26 Analysis of the message flow<br />

- T 5.27 Repudiation of a message<br />

- T 5.28 Denial of services<br />

- T 5.43 Macro viruses<br />

- T 5.72 Misuse of e-mail services<br />

- T 5.73 Impersonation of a sender<br />

- T 5.74 Manipulation of alias files and distribution lists<br />

- T 5.75 Overload due to incoming e-mails<br />

- T 5.76 Mail bombs<br />

- T 5.77 Unauthorised monitoring of e-mails<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!