19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 2.38 Lack of, or inadequate implementation of<br />

database security mechanisms<br />

Database software normally includes a number of security mechanisms that<br />

allow data to be protected against unauthorised access and similar intrusions.<br />

However, most of these mechanisms do not activate automatically and need<br />

to be activated manually from the database administrator. If none of these<br />

mechanisms is used, neither the confidentiality nor the integrity of the data<br />

can be guaranteed. In such cases, it is usually not possible to identify and log<br />

security violations. <strong>The</strong> consequences of this can range from the manipulation<br />

and loss of data to the destruction of the database.<br />

Example:<br />

In the case of the MS Access database, activation of the password is optional.<br />

Due to this it is quite possible to gain unauthorised access to the database and<br />

to therefore also have unauthorised access to all kinds of data stored inside<br />

the database. In this case, any auditing of database access is not possible.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!