19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 3.30 Unauthorised private use of telecommuting<br />

workstations<br />

At home, it is easier to make private use of telecommuting workstations, as<br />

the employer only has restricted possibilities of monitoring such usage. This<br />

might result in the installation of software which has not been checked, or that<br />

data infected by computer viruses will be stored on the telecommuting<br />

workstation . Unauthorised use of the telecommuting workstation is possible<br />

for the telecommuter as well as relatives and guests. In particular, children and<br />

adolescents might be tempted to use the professional workstation to play<br />

games, without the telecommuter even being aware of this. Potential damages<br />

are for example: erased hard disks resulting in a complete loss of data, which<br />

would entail re-installation expenses and a re-entry of data.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!