19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.29 Unauthorised copying of data media<br />

When data media are replaced or transported, the information on them might<br />

be transferred from a secured environment via an insecure route to an insecure<br />

environment at the receiving end. In such cases, unauthorised persons could<br />

make copies of this information more easily than in the original environment.<br />

Example:<br />

Confidential engineering results are to be transported from a development<br />

laboratory in town X to the production site in town Y. If the data media are<br />

mailed without any supervision or control, the information on them might be<br />

copied illegally and perhaps sold to a competitor, without any indication of<br />

such an exposure of information.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!