19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 2.8 Uncontrolled use of resources<br />

Resources - of any type - may only be used for their designated purpose. <strong>The</strong><br />

persons responsible for the procurement and use of resources must both<br />

prevent their uncontrolled use and monitor their correct use. Inadequate<br />

control of the use of resources can entail multifarious risks.<br />

Examples:<br />

- Use of private data media by staff members may lead to virus infection of<br />

company PC's.<br />

- Use of wrong cleaning products can damage the VDUs.<br />

- <strong>The</strong> wrong type of ink for an ink jet printer can result in the soiling or<br />

malfunction of the printer.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!