19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 2.22 Lack of evaluation of auditing data<br />

Auditing data provide a possibility to detect a posteriori a breach of security<br />

or an attempt to do so. Auditing data can thus be used to identify the<br />

perpetrator in case of damage. A further important function of the auditing<br />

data is deterrence. If auditing data are evaluated on a regular basis, intentional<br />

attacks can be detected at an early stage. If the auditing data are not, or are<br />

inadequately evaluated and this becomes known, they lose their function as a<br />

deterrent.<br />

Many <strong>IT</strong> systems or applications lack sufficient possibilities for auditing. In<br />

some cases auditing is not provided for at all and in other cases it is often not<br />

possible to make distinctions in the auditing according to events.<br />

Example:<br />

On a stand-alone Windows 95 computer it is not possible to log the activities<br />

of one or more users on a user-specific basis. <strong>The</strong>refore, it cannot be<br />

determined if security has been impaired or an attempt to impair security has<br />

occurred.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!