19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> of Generic Components<br />

_________________________________________________________________________________________<br />

Loss of availability<br />

Would the failure of the <strong>IT</strong> application restrict information services provided to external parties?<br />

Would (temporary) failure of the <strong>IT</strong> application be noticed by outsiders?<br />

Damage scenario "Financial consequences"<br />

Direct or indirect financial damage can result from the loss of confidentiality of sensitive data, from<br />

alteration of data, or from the failure of an <strong>IT</strong> application. Examples include:<br />

- unauthorised release of R&D results<br />

- manipulation of financially-relevant data in an accounting system<br />

- failure of an <strong>IT</strong>-controlled production system, resulting in a drop in sales<br />

- obtaining knowledge of marketing strategy papers or of turnover figures<br />

- failure of a booking system of a travel agency<br />

- failure of an e-commerce server<br />

- breakdown of a bank's payment transactions<br />

- theft or destruction of hardware<br />

<strong>The</strong> extent of the total damage caused is determined by the direct and indirect costs, e.g. damage to<br />

property, compensation, additional expenses (e.g. data recovery).<br />

Questions:<br />

Loss of confidentiality<br />

Could the publication of confidential information result in claims for compensation?<br />

Does the <strong>IT</strong> application contain any data which, if known to a third party (e.g. a competitor), could<br />

give it any financial advantage?<br />

Is any research data of significant value stored using the <strong>IT</strong> application? What would happen if such<br />

data were copied and passed on without permission?<br />

Could any damage be caused by premature publication of sensitive data?<br />

Loss of integrity<br />

Could any data relevant to accounting be altered by data manipulation in such a way as to cause<br />

financial loss?<br />

Could the publication of incorrect information result in any claims to compensation?<br />

Could any financial loss result from corrupted ordering data (e.g. just-in-time production)?<br />

Could corrupted data lead to wrong business decisions?<br />

Loss of availability<br />

Would failure of the <strong>IT</strong> application impair production, inventory management or distribution?<br />

Would failure of the <strong>IT</strong> application result in financial loss due to delayed payments or loss of interest?<br />

How much would it cost to repair or restore the <strong>IT</strong> system if it were to fail, develop a fault, be<br />

destroyed or stolen?<br />

Could failure of the <strong>IT</strong> application result in deficient solvency or in contractual penalties?<br />

How many important customers would be affected by a failure of the <strong>IT</strong> application?<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!