19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 2.21 Inadequate organisation of the exchange of<br />

users<br />

In the case that several users work on one <strong>IT</strong> system at different times, an<br />

exchange of users is inevitable. If this is not adequately organised and<br />

administered, it may not fulfil security requirements. This can be open to<br />

abuse if:<br />

- current applications are not closed correctly,<br />

- current data are not saved,<br />

- data remain in the main storage or in temporary files,<br />

- the previous user does not log off,<br />

- the new user does not correctly log on to the <strong>IT</strong> system.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!