19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 2.62 Inappropriate handling of security incidents<br />

In practice, the possibility of a potentially extremely damaging security<br />

incident can never be eliminated, even where extensive security measures<br />

have been implemented. If appropriate action is not taken in response to a<br />

security incident, considerable damage or loss could occur or the situation<br />

could even develop into a catastrophe.<br />

Examples include:<br />

- New computer viruses containing damaging functionality at first occur on a<br />

sporadic basis but afterwards they are found on a wide scale. Without an<br />

appropriate and rapid response, entire organisational units can be put out of<br />

action. This is what happened when the "Melissa" virus appeared.<br />

- <strong>The</strong> material held on a Web server changes inexplicably. If this is not<br />

investigated as a possible sign of a hacker attack, further attacks on the<br />

server could result in considerable loss of image.<br />

- Inconsistencies are found in the log files of a firewall. Unless this is<br />

investigated as a hacking attempt, external adversaries could actually<br />

penetrate the firewall.<br />

- New security weaknesses in the used <strong>IT</strong> systems become known. If this<br />

information is not obtained in good time and the necessary<br />

countermeasures are not taken speedily, there is a danger that the security<br />

weaknesses will be misused by either internal or external perpetrators.<br />

- <strong>The</strong>re are signs that corporate data has been manipulated. If the opportunity<br />

to follow up the manipulations is overlooked, undetected manipulations<br />

could result in extensive consequential damage, such as, for example,<br />

incorrect stock levels, false book-keeping or unchecked outflows of funds.<br />

- Failure to take action when there is evidence that confidential corporate<br />

data has been compromised could result in additional confidential<br />

information being leaked.<br />

<strong>The</strong>se examples illustrate how important it is that security incidents are<br />

reported promptly to the responsible persons, action is taken quickly and those<br />

potentially affected are informed of how to minimise the damage or prevent it.<br />

Again, in the absence of defined appropriate procedures for handling security<br />

incidents, it is possible for incorrect decisions to be made with the result, for<br />

example, that<br />

- representatives of the press obtain incorrect information;<br />

- the systems or components affected are not switched off even though there<br />

are serious security weaknesses;<br />

- systems or individual components are switched off completely even though<br />

the security weaknesses concerned are relatively minor;<br />

- there is no provision for backup measures, e.g. for replacement of<br />

compromised components, cryptographic procedures or keys.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Non-productive time<br />

Impaired company image<br />

Consequential damage<br />

Wrong decisions

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!