19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.70 Manipulation by family members or visitors<br />

Workstations at home are generally accessible to family members and visitors,<br />

so that they might be able to manipulate business-related data on the<br />

workstations if the data is not protected adequately. Possible scenarios here<br />

include the installation of private software (e.g. computer games) by family<br />

members, damage to <strong>IT</strong> by children, and misappropriation of business-related<br />

data media for use by unauthorised third parties. This type of inadvertent or<br />

intentional manipulation affects the confidentiality and integrity of the<br />

business-related information, as well as the availability of data and <strong>IT</strong> services<br />

on the workstation.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!