19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Other <strong>IT</strong> Components Telecommuting<br />

_________________________________________________________________________________________<br />

Force Majeure<br />

- T 1.1 Loss of personnel<br />

Organisational shortcomings:<br />

- T 2.1 Lack of, or insufficient, rules<br />

- T 2.2 Insufficient knowledge of requirements documents<br />

- T 2.4 Insufficient monitoring of <strong>IT</strong> security measures<br />

- T 2.5 Lack of, or inadequate, maintenance<br />

- T 2.7 Unauthorised use of rights (on the workstations at home and at the institution)<br />

- T 2.8 Uncontrolled use of resources<br />

- T 2.22 Lack of evaluation of auditing data<br />

- T 2.24 Loss of confidentiality of sensitive data of the network to be protected<br />

- T 2.49 Lack of, or inadequate, training of teleworkers<br />

- T 2.50 Delays caused by a temporarily restricted availability of teleworkers<br />

- T 2.51 Poor integration of teleworkers into the information flow<br />

- T 2.52 Longer response times in the event of an <strong>IT</strong> system breakdown<br />

- T 2.53 Inadequate regulations concerning substitution of teleworkers<br />

Human Failure:<br />

- T 3.1 Loss of data confidentiality/integrity as a result of <strong>IT</strong> user error<br />

- T 3.3 Non-compliance with <strong>IT</strong> security measures<br />

- T 3.9 Improper <strong>IT</strong> system administration<br />

- T 3.13 Transfer of incorrect or undesired data records<br />

- T 3.16 Incorrect administration of site and data access rights<br />

- T 3.30 Unauthorised private use of telecommuting workstations<br />

Technical Failure:<br />

- T 4.13 Loss of stored data<br />

Deliberate Acts:<br />

- T 5.1 Manipulation/destruction of <strong>IT</strong> equipment or accessories<br />

- T 5.2 Manipulation of data or software<br />

- T 5.7 Interception of lines<br />

- T 5.8 Manipulation of lines<br />

- T 5.9 Unauthorised use of <strong>IT</strong> systems<br />

- T 5.10 Abuse of remote maintenance ports<br />

- T 5.18 Systematic trying-out of passwords (on the workstations at home and at the institution)<br />

- T 5.19 Abuse of user rights<br />

- T 5.20 Misuse of administrator rights<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!