19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 2.41 Poor organisation of the exchange of database<br />

users<br />

In situations where several users of a database share the same workstation,<br />

inadvertent or deliberate data manipulations might result if the changes<br />

between these users are poorly organised or undertaken incorrectly. Here too,<br />

the confidentiality of the data is no longer guaranteed.<br />

Example:<br />

If an application that accesses a database is not exited correctly before a<br />

change of user occurs, the different authorisation profiles of the affected users<br />

will give rise to the afore-mentioned threats. This will also subvert the logging<br />

function of the database that records the data modifications, and also those<br />

tasks performed under the active user ID. However this ID will no longer<br />

correspond to the user who is actually logged in.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!