19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 2.7 Unauthorised use of rights<br />

Rights of admission and of access to hardware and software are applied as<br />

organisational measures to ensure secure and proper use of <strong>IT</strong> systems and<br />

processes. If such rights are granted to the wrong person, or if a right is<br />

abused, the result may be a variety of hazards which can impair the confidentiality<br />

and integrity of data or the availability of computer performance.<br />

Example:<br />

During the absence of the archive keeper, a work scheduler who is not<br />

authorised to have access to the data medium archives takes some magnetic<br />

tapes for the purpose of making backup copies. Due to such uncontrolled<br />

removal of media, the inventory list of the data medium archives is not<br />

updated, and the tapes cannot be located during this period.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!