19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 3.16 Incorrect administration of site and data<br />

access rights<br />

Access rights to an <strong>IT</strong> system, to stored data and to <strong>IT</strong> applications should<br />

only be granted to the extent required to carry out the necessary tasks. If these<br />

rights are administered incorrectly, it can result in a disruption of the<br />

operation. if the necessary access rights were not granted or to security leaks if<br />

more rights were granted than required.<br />

Example:<br />

As a result of incorrect administration of access rights, a clerk is able to gain<br />

access to auditing data. By deleting specific entries, he is able to cover up his<br />

attempts to manipulate the computer because they will not appear in the log<br />

file any longer.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!