19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 3.13 Transfer of incorrect or undesired data<br />

records<br />

It is possible that data media intended for dispatch might contain data from<br />

earlier transactions not meant for disclosure to the recipient. If this data is not<br />

physically and intentionally deleted, it will be possible for the recipient to<br />

view it.<br />

If the data to be transferred is located within a directory containing additional<br />

data requiring protection, there is the danger that they will be transferred<br />

inadvertently to the data medium as well (e.g. by copy *.*) and become<br />

accessible to the (unauthorised) recipients.<br />

If data records have to be sent directly via data networks instead of ‘storage’<br />

media (e-mail via the Internet, modem links, Intranets, X400 service),<br />

communication programs offer the possibility to use short descriptions for<br />

complex address and distribution lists for multiple dispatch. If such<br />

distribution lists are not kept centrally or not updated at regular intervals, data<br />

records might be sent to addresses of persons who are no longer authorised.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!