19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 4.29 Loss of data in a database caused by a lack of<br />

T 4.30 Loss of database integrity/consistency<br />

T 4.31 Failure or malfunction of a<br />

T 4.32 Failure to dispatch a message<br />

T 4.33 Poor-quality or missing authentication<br />

T 4.34 Failure of a cryptomodule<br />

T 4.35 Insecure cryptographic algorithms<br />

T 4.36 Mistakes in encrypted data<br />

T 4.37 Lack of time authenticity in E-mail<br />

T 4.38 Failure of components of a network management<br />

system or system management system<br />

T 4.39 Software conception errors<br />

T 4.40 Unsuitable fitting out of the RAS client<br />

T 4.41 Non-availability of the mobile communication network<br />

T 4.42 Failure of the mobile phone<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!