19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Other <strong>IT</strong> Components Telecommuting<br />

_________________________________________________________________________________________<br />

Threat Scenario<br />

<strong>The</strong> following threats are assumed to be applicable to the <strong>IT</strong> baseline protection of databases:<br />

Force Majeure<br />

- T 1.1 Loss of personnel<br />

Organisational shortcomings:<br />

- T 2.3 A lack of compatible, or unsuitable, resources<br />

- T 2.22 Lack of evaluation of auditing data<br />

- T 2.26 Lack of, or inadequate, test and release procedures<br />

- T 2.38 Lack of, or inadequate, implementation of database security mechanisms<br />

- T 2.39 Complexity of a DBMS<br />

- T 2.40 Complexity of database access<br />

- T 2.41 Poor organisation of the exchange of database users<br />

- T 2.57 Inadequate storage of media in the event of an emergency<br />

Human Failure:<br />

- T 3.6 Hazards posed by cleaning staff or outside staff<br />

- T 3.16 Incorrect administration of site and data access rights<br />

- T 3.23 Improper administration of a DBMS<br />

- T 3.24 Inadvertent manipulation of data<br />

Technical Failure:<br />

- T 4.26 Failure of a database<br />

- T 4.27 Circumvention of access control via ODBC<br />

- T 4.28 Loss of data in a database<br />

- T 4.29 Loss of data in a database caused by a lack of storage space<br />

- T 4.30 Loss of database integrity/consistency<br />

Deliberate Acts:<br />

- T 5.9 Unauthorised use of <strong>IT</strong> systems<br />

- T 5.10 Abuse of remote maintenance ports<br />

- T 5.18 Systematic trying-out of passwords<br />

- T 5.64 Manipulation of data or software in database systems<br />

- T 5.65 Denial of services in a database system<br />

Recommended Countermeasures (S)<br />

For the purpose of <strong>IT</strong> baseline protection, we recommend the complete implementation of the<br />

safeguard packages (modules) summarised in Chapters 2.1 and 2.4.<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!