HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual T 5.1 Manipulation/destruction of IT equipment or accessories

T 5.1 Manipulation/destruction of IT equipment or accessories

External - as well as internal - perpetrators may for various reasons (revenge, malice, frustration) try to manipulate or destroy IT equipment, accessories, documents, or the like. Such manipulations can be the most effective as the later they are detected, the deeper the perpetrator's knowledge, and the greater the impact there is on a work cycle. Effects range from unauthorised inspection of sensitive data to the destruction of data media or IT systems, which may result in considerable down-time periods.


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
 
home