19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Data Transmission Systems Remote Access<br />

_________________________________________________________________________________________<br />

Force Majeure<br />

- T 1.1 Loss of personnel<br />

- T 1.2 Failure of the <strong>IT</strong> system<br />

- T 1.10 Failure of a wide area network<br />

Organisational Shortcomings<br />

- T 2.2 Insufficient knowledge of requirements documents<br />

- T 2.16 Non-regulated change of users in the case of laptop PCs<br />

- T 2.19 Inadequate key management for encryption<br />

- T 2.37 Uncontrolled usage of communications lines<br />

- T 2.44 Incompatible active and passive network components<br />

- T 2.49 Lack of, or inadequate, training of teleworkers<br />

- T 2.64 Lack of or defective rules for the RAS system<br />

Human Error<br />

- T 3.30 Unauthorised private use of telecommuting workstations<br />

- T 3.39 Improper administration of the RAS system<br />

- T 3.40 Inappropriate use of authentication services with remote access<br />

- T 3.41 Improper use of remote access services<br />

- T 3.42 Insecure configuration of RAS clients<br />

- T 3.43 Inappropriate handling of passwords<br />

- T 3.44 Carelessness in handling information<br />

Technical Failure<br />

- T 4.35 Insecure cryptographic algorithms<br />

- T 4.40 Unsuitable fitting out of the RAS client operational environment<br />

Deliberate Acts<br />

- T 5.7 Line tapping<br />

- T 5.8 Manipulation of lines<br />

- T 5.22 <strong>The</strong>ft of a mobile <strong>IT</strong> system<br />

- T 5.39 Infiltrating computer systems via communication cards<br />

- T 5.71 Loss of confidentiality of classified information<br />

- T 5.83 Compromising cryptographic keys<br />

- T 5.91 Disabling of RAS access security mechanisms<br />

- T 5.92 Use of the RAS client as RAS server<br />

- T 5.93 Permitting use of RAS components by third parties<br />

Recommended Countermeasures (S)<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!