19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 2.36 Inappropriate restriction of user environment<br />

Various operating systems (e.g. Windows 95, Windows NT) and PC-security<br />

products offer the possibility of restricting the user environment on an<br />

individual basis for each user. Principally, two different possibilities exist to<br />

do this:<br />

1. Certain functions are permitted and all others are prohibited.<br />

2. Certain functions are prohibited while all others are permitted.<br />

In both cases, there is the possibility of restricting the user in such a way that<br />

he/she may no longer be able to carry out essential functions, or that sensible<br />

and efficient work with the PC is no longer possible.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!