19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.71 Loss of confidentiality of classified<br />

information<br />

In the case of classified information (such as passwords, person-related data,<br />

certain business-related and official information, research & development<br />

data) there is an inherent danger of the confidentiality of this information<br />

being impaired inadvertently or intentionally. Classified information can be<br />

tapped from various sources, including<br />

- Internal storage media (hard disks)<br />

- External storage media (floppy disks, magnetic tapes)<br />

- Printed paper (hardcopies, files) and<br />

- data communications lines.<br />

<strong>The</strong>re are various ways of actually obtaining the confidential information:<br />

- Reading out data<br />

- Copying data<br />

- Reading of data backups<br />

- <strong>The</strong>ft of data media for the purpose of evaluation<br />

- Monitoring data transmission lines<br />

- Viewing data on a screen.<br />

<strong>The</strong> more classified a piece of information, the higher the incentive for third<br />

parties to obtain and misuse it.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!