19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 3.44 Carelessness in handling information<br />

It is frequently observed that although a number of organisational or technical<br />

security procedures are in place, these are undermined through careless<br />

handling of the technology. A typical example of this is the almost proverbial<br />

sticker on the monitor which contains a list of all the access passwords.<br />

Abundant other examples of carelessness, dereliction of duty or recklessness<br />

in handling information that needs to be kept secure are also to be found.<br />

Examples:<br />

- Employees often divulge confidential information about their company<br />

over mobile phones on trains or in restaurants. This information is not only<br />

heard by the person the other end but also by everyone around. Examples<br />

of particularly interesting internal information divulged in this way include<br />

- why a contract with another company was lost or<br />

- how many millions planning errors in the strategy department have cost<br />

and how this could depress the share price of the company if anyone were<br />

to find out about it.<br />

- Often it is necessary during business trips to take a notebook, an organiser<br />

or data storage media along with one. During breaks, these are gaily left<br />

behind in the meeting room, the train compartment or the car. <strong>The</strong> data<br />

stored on these mobile <strong>IT</strong> systems is often not backed up anywhere else. If<br />

the <strong>IT</strong> system is then stolen, the data is lost for ever. In addition, a thief<br />

may be able to make good money from the sale of potentially explosive<br />

data that he has been able to access easily due to lack of encryption or<br />

access protection.<br />

- One reason for taking a notebook or files on business trips is to be able to<br />

make productive use of travelling time. This practice often provides fellow<br />

travellers with interesting insights, as it is virtually impossible on a train or<br />

aircraft to prevent a person in the next seat from also being able to read the<br />

documents or the screen.<br />

Premises which are open to the public, e.g. hotel foyers, hotel business<br />

centres or train compartments, generally provide little in the way of privacy<br />

protection. If the user enters passwords or has to make changes to the<br />

configuration, an adversary could acquire this information and misuse it.<br />

- Articles appear at regular intervals in the press about public bodies and<br />

companies whose dustbins in the rear yard contain highly explosive<br />

documents. For example, pay information for all the employees in one<br />

company and the ex-directory phone numbers of a company’s board of<br />

directors have become public knowledge by this means.<br />

- When <strong>IT</strong> systems develop faults, they are sent quickly for repair. Often<br />

once a system has developed a fault it is no longer possible to delete data<br />

that is stored on it. When a failure occurs the top priority is usually to have<br />

a working machine again as soon as possible. For this reason, many<br />

specialist suppliers offer a special customer service which involves simply<br />

exchanging defective components and sending customers home with a<br />

system that works.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Allowing information to<br />

be overheard<br />

Allowing information to<br />

fall into the wrong hands<br />

Allowing other people to<br />

read information<br />

Explosive information in<br />

waste containers<br />

Exchange of<br />

components during<br />

repair

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!