19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 3.3 Non-compliance with <strong>IT</strong> security measures<br />

Due to negligence and insufficient checks, persons frequently fail to perform,<br />

in part or full, recommended or prescribed <strong>IT</strong> security measures. Damage may<br />

be caused which otherwise could have been prevented, or at least minimised.<br />

Depending upon the position of the given person and on the importance of the<br />

disregarded measure, severe damage could occur here.<br />

<strong>IT</strong> security measures are frequently disregarded due to the lack of security<br />

awareness. A typical sign is the disregarding of recurrent error messages after<br />

a certain habituation period.<br />

Examples:<br />

- <strong>The</strong> keeping of floppy disks in a locked desk does not afford sufficient<br />

protection against unauthorised access if the key is kept in the office e.g.<br />

on top of a cupboard or inside a card box.<br />

- Passwords which need to be kept secret are kept on a piece of paper near a<br />

terminal or a PC.<br />

- Although the purpose of data backups to minimise potential damage is<br />

widely known, losses of data do occasionally occur when unexpected<br />

deletion of data takes place and recovery is not possible due to lack of<br />

backups. This is particularly illustrated by the damage reported to BSI,<br />

resulting from computer viruses, for instance.<br />

- Access to a computer centre should take place exclusively through a door<br />

secured by an entry control system (e.g. magnetic strip reader). However,<br />

the emergency exit door can be used as an additional entrance and exit<br />

although it may only be opened in an emergency..<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!