19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 2 Threats Catalogue Organisational<br />

Shortcomings<br />

T 2.1 Lack of, or insufficient, rules<br />

T 2.2 Insufficient knowledge of requirements documents<br />

T 2.3 A lack of compatible, or unsuitable, resources<br />

T 2.4 Insufficient monitoring of <strong>IT</strong> security measures<br />

T 2.5 Lack of, or inadequate, maintenance<br />

T 2.6 Unauthorised admission to rooms requiring protection<br />

T 2.7 Unauthorised use of rights<br />

T 2.8 Uncontrolled use of resources<br />

T 2.9 Poor adjustment to changes in the use of <strong>IT</strong><br />

T 2.10 Data media are not available when required<br />

T 2.11 Insufficient bandwidth planning<br />

T 2.12 Insufficient documentation on cabling<br />

T 2.13 Inadequately protected distributors<br />

T 2.14 Impairment of <strong>IT</strong> usage on account of adverse working<br />

conditions<br />

T 2.15 Loss of confidentiality of sensitive data in the UNIX<br />

system<br />

T 2.16 Non-regulated change of users in the case of laptop PCs<br />

T 2.17 Inadequate labelling of data media<br />

T 2.18 Improper delivery of data media<br />

T 2.19 Inadequate key management for encryption<br />

T 2.20 Inadequate supply of printing consumables for fax<br />

machines<br />

T 2.21 Inadequate organisation of the exchange of users<br />

T 2.22 Lack of evaluation of auditing data<br />

T 2.23 Security flaws involved in integrating DOS PCs into a<br />

server-based network<br />

T 2.24 Loss of confidentiality of sensitive data of the network<br />

to be protected<br />

T 2.25 Reduction of transmission or execution speed caused by<br />

Peer-to-Peer functions<br />

T 2.26 Lack of, or inadequate, test and release procedures<br />

T 2.27 Lack of, or inadequate, documentation<br />

T 2.28 Violation of copyright<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!