19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Telecommunications LAN connection of an <strong>IT</strong> system via ISDN<br />

_________________________________________________________________________________________<br />

Force Majeure<br />

- T 1.2 Failure of the <strong>IT</strong> system<br />

- T 1.10 Failure of a wide area network<br />

Organisational Shortcomings:<br />

- T 2.1 Lack of, or insufficient, rules<br />

- T 2.6 Unauthorised admission to rooms requiring protection<br />

- T 2.7 Unauthorised use of rights<br />

- T 2.9 Poor adjustment to changes in the use of <strong>IT</strong><br />

- T 2.19 Inadequate key management for encryption<br />

- T 2.22 Lack of evaluation of auditing data<br />

- T 2.24 Loss of confidentiality of sensitive data of the network to be protected<br />

- T 2.32 Inadequate line bandwidth<br />

- T 2.37 Uncontrolled usage of communications lines<br />

Human Error:<br />

- T 3.1 Loss of data confidentiality/integrity as a result of <strong>IT</strong> user error<br />

- T 3.6 Hazards posed by cleaning staff or outside staff<br />

- T 3.8 Improper use of the <strong>IT</strong> system<br />

- T 3.9 Improper <strong>IT</strong> system administration<br />

- T 3.13 Transfer of incorrect or undesired data records<br />

- T 3.16 Incorrect administration of site and data access rights<br />

Technical Failure:<br />

- T 4.8 Discovery of software vulnerabilities<br />

- T 4.25 Still active connections<br />

Deliberate Acts:<br />

- T 5.2 Manipulation of data or software<br />

- T 5.7 Line tapping<br />

- T 5.8 Manipulation of lines<br />

- T 5.9 Unauthorised use of <strong>IT</strong> systems<br />

- T 5.10 Abuse of remote maintenance ports<br />

- T 5.14 Call charges fraud<br />

- T 5.16 Threat posed by internal staff during maintenance/administration work<br />

- T 5.17 Threat posed by external staff during maintenance work<br />

- T 5.18 Systematic trying-out of passwords<br />

- T 5.25 Masquerading<br />

- T 5.26 Analysis of the message flow<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!