HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual T 5.2 Manipulation of data or software

T 5.2 Manipulation of data or software

Data or software can be manipulated in various ways: wrong acquisition of data, changes to access rights, modification of accounting data or of correspondence, changes to the operating system software, etc. A perpetrator can only manipulate data and software to which he has access. The more access rights a person has, the more serious manipulations he will be able to carry out. If such manipulations are not detected in time, smooth IT operations may be seriously impaired.

Manipulations of data or software can be performed for reasons of revenge, to intentionally create some damage, to obtain personal gains, or for financial reasons.

Example:

In 1993, the software used for specific financial services of a Swiss financial institute was manipulated by a staff member. This made it possible for him to obtain sizeable amounts of money illegally.


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
 
home