19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.64 Manipulation of data or software in database<br />

systems<br />

In this case, data is corrupted or rendered useless through deliberate<br />

manipulation. <strong>The</strong> consequences of this are described under T 4.28 Loss of<br />

data in a database and T 4.30 Loss of database integrity/consistency.<br />

<strong>The</strong> deliberate deletion/modification of files in a database or files of the<br />

standard database software lead to the destruction of the entire database<br />

system (refer to T 4.26 Failure of a database).<br />

In principle, it is not possible to prevent users from deliberately manipulating<br />

data or destroying a database within the scope of the access rights allocated to<br />

them. However, if access rights can be circumvented (e.g. due to incorrect<br />

administration of the DBMS), then even unauthorised parties can gain access<br />

to the database and manipulate the data contained therein.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!