19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

reports which lay down clear priorities, it is probable that insufficient<br />

resources will be made available for the <strong>IT</strong> security process or that these<br />

will be applied in an inappropriate manner. In the latter case it is possible<br />

to have an excessively high level of security in one sub-area and serious<br />

deficiencies in another. Another common observation is that expensive<br />

technical security systems are incorrectly used, rendering them ineffective<br />

or even transforming them into security hazards.<br />

- Impracticability of safeguard concepts. To achieve a consistent level of <strong>IT</strong><br />

security it is necessary that those in positions of responsibility within an<br />

organisation co-operate with each other. Inadequate strategic direction and<br />

unclear objectives sometimes result in different interpretations of the<br />

importance of <strong>IT</strong> security. This can have the result that the necessary cooperation<br />

is ultimately not forthcoming due to the supposed non-necessity<br />

or inadequate prioritisation of the "<strong>IT</strong> security" task, and hence that the<br />

implementability of the <strong>IT</strong> security measures cannot be taken for granted.<br />

- Failure to update the <strong>IT</strong> security process. New <strong>IT</strong> systems or new threats<br />

have a direct impact on the <strong>IT</strong> security position within an organisation.<br />

Without an effective review concept, the <strong>IT</strong> security level will fall over<br />

time. Thus, what was once really secure slowly gives way to a dangerous<br />

illusion of security because people are often not aware of the new threats.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!