Information Technology Reference
In-Depth Information
9.4.3 Threats
As will be outlined further down possible threats are manifold and specific for the
area of wireless communications and surpass classical risk scenarios. They can be
classified roughly in the following manner:
￿ Direct access to central hardware with the intention to destroy or disrupt
operations
￿ Spying attempts on central applications
￿ Spying attempts on decentralized applications
￿ Attempts to manipulate central and/or decentralized data
￿ Deployment of malware and
￿ Theft of terminal devices.
In addition there are many more aspects, which will not be discussed in
detail here.
9.4.4 Equipment
Equipment bearing a high risk potential are among others:
￿ Central IT installations
￿ Fixed peripheral devices
￿ Mobile terminal devices
￿ External storage media and
￿ Communication modules (modems, ports, switches etc.)
9.4.5 Utility Services
Utility services are prone to create risks, once they
￿ Do not function or
￿ Function wrongly.
Electricity supplies belong to the first category. To prevent interruptions emer-
gency power supplies have to be on standby. Water supplies belong to the latter
category, if large quantities of water penetrate computer rooms and endanger
hardware due to water pipe fracture. For both cases emergency plans have to be
drawn up.
Search WWH ::




Custom Search