19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 2.6 Unauthorised admission to rooms requiring<br />

protection<br />

If unauthorised persons enter protected rooms, hazards may be entailed not<br />

only by deliberate acts, but also by inadvertence. Disruption is caused merely<br />

by the fact that checks must be made for potential damage as a result of the<br />

unauthorised access. In this context, domestic rooms used for business<br />

purposes should also be considered as security areas.<br />

Example:<br />

Temporary help is employed to substitute for cleaning staff on vacation. <strong>The</strong><br />

stand-in cleaner, without any instructions to this effect, decides to clean the<br />

computing centre. She opens the emergency exit and thus trips the alarm.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!