HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual T 5.64 Manipulation of data or software in database systems

T 5.64 Manipulation of data or software in database systems

In this case, data is corrupted or rendered useless through deliberate manipulation. The consequences of this are described under T 4.28 Loss of data in a database and T 4.30 Loss of database integrity/consistency.

The deliberate deletion/modification of files in a database or files of the standard database software lead to the destruction of the entire database system (refer to T 4.26 Failure of a database).

In principle, it is not possible to prevent users from deliberately manipulating data or destroying a database within the scope of the access rights allocated to them. However, if access rights can be circumvented (e.g. due to incorrect administration of the DBMS), then even unauthorised parties can gain access to the database and manipulate the data contained therein.


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
July 1999
home