|
External - as well as internal - perpetrators may for various reasons (revenge, malice, frustration) try to manipulate or destroy IT equipment, accessories, documents, or the like. Such manipulations can be the most effective as the later they are detected, the deeper the perpetrator's knowledge, and the greater the impact there is on a work cycle. Effects range from unauthorised inspection of sensitive data to the destruction of data media or IT systems, which may result in considerable down-time periods.
© Copyright
by Bundesamt für Sicherheit in der Informationstechnik |