T 5 Threat catalogue Deliberate Acts

T 5.1 Manipulation or destruction of equipment or accessories

T 5.2 Manipulation of information or software

T 5.3 Unauthorised entry into a building

T 5.4 Theft

T 5.5 Vandalism

T 5.6 Attack

T 5.7 Line tapping

T 5.8 Manipulation of lines

T 5.9 Unauthorised use of IT systems

T 5.10 Abuse of remote maintenance ports

T 5.11 Loss of confidentiality of data stored in PBX systems

T 5.12 Interception of telephone calls and data transmissions

T 5.13 Wiretapping of rooms using PBX terminal devices

T 5.14 Call charges fraud

T 5.15 Abuse of features of PBX systems

T 5.16 Threat during maintenance/administration work

T 5.17 Threat posed by external staff during maintenance work - not to apply

T 5.18 Systematic trying-out of passwords

T 5.19 Abuse of user rights

T 5.20 Misuse of administrator rights

T 5.21 Trojan horses

T 5.22 Theft of a mobile IT system

T 5.23 Malicious software

T 5.24 Replay of messages

T 5.25 Masquerade

T 5.26 Analysis of the message flow

T 5.27 Repudiation of a message

T 5.28 Denial of services

T 5.29 Unauthorised copying of data media

T 5.30 Unauthorised use of fax machine or fax server

T 5.31 Unauthorised reading of incoming fax transmissions

T 5.32 Evaluation of residual information in fax machines and fax servers

T 5.33 Sending faxes under a false identity

T 5.34 Deliberate re-programming of the destination keys on fax machines

T 5.35 Overload due to incoming fax transmissions

T 5.36 Deliberate overloading of answering machines - not to apply

T 5.37 Determining access codes - not to apply

T 5.38 Misuse of remote inquiry - not to apply

T 5.39 Infiltrating computer systems via communication cards

T 5.40 Monitoring rooms using computers equipped with microphones and cameras

T 5.41 Misuse of an UNIX system with the help of UUCP

T 5.42 Social Engineering

T 5.43 Macro viruses

T 5.44 Abuse of remote access ports for management functions of private branch exchanges

T 5.45 Trying out passwords under WfW and Windows 95 - not to apply

T 5.46 Masquerading under WfW - not to apply

T 5.47 Deleting the post office under WfW - not to apply

T 5.48 IP spoofing

T 5.49 Abuse of source routing

T 5.50 Abuse of the ICMP protocol

T 5.51 Abuse of routing protocols

T 5.52 Misuse of administrator rights in Windows operating systems

T 5.53 Deliberate misuse of protective cabinets for reasons of convenience

T 5.54 Deliberately causing an Abnormal End - not to apply

T 5.55 Login bypass - not to apply

T 5.56 Temporary free-access accounts - not to apply

T 5.57 Network analysis tools

T 5.58 Hacking Novell Netware - not to apply

T 5.59 Misuse of administrator rights in the Novell Netware network 3.x - not to apply

T 5.60 By-passing system guidelines - not to apply

T 5.61 Misuse of remote access to management functions on routers

T 5.62 Misuse of resources via remote IT systems - not to apply

T 5.63 Manipulation via the ISDN D-channel

T 5.64 Manipulation of data or software in database systems

T 5.65 Denial of services in a database system

T 5.66 Unauthorised connection of IT systems to a network

T 5.67 Unauthorised execution of network management functions

T 5.68 Unauthorised access to active network components

T 5.69 Higher risk of theft from a working place at home

T 5.70 Manipulation by family members or visitors

T 5.71 Loss of confidentiality of classified information

T 5.72 Abuse of groupware

T 5.73 Impersonation of wrong sender

T 5.74 Manipulation of alias files and distribution lists - not to apply

T 5.75 Overload due to incoming e-mails

T 5.76 Mail bombs - not to apply

T 5.77 Unauthorised monitoring of emails

T 5.78 DNS spoofing

T 5.79 Unauthorised acquisition of administrator rights under Windows systems

T 5.80 Hoax

T 5.81 Unauthorized use of a cryptomodule

T 5.82 Manipulation of a cryptomodule

T 5.83 Compromising cryptographic keys

T 5.84 Forged certificates

T 5.85 Loss of integrity of information that should be protected

T 5.86 Manipulation of management parameters

T 5.87 Web spoofing

T 5.88 Abuse of active content

T 5.89 Hijacking of network connections

T 5.90 Manipulation of address books and distribution lists

T 5.91 Disabling of RAS access security mechanisms - not to apply

T 5.92 Use of the VPN client as a VPN server

T 5.93 Permitting use of VPN components by third parties

T 5.94 Misuse of cards

T 5.95 Bugging of indoor conversations over mobile phones

T 5.96 Tampering with mobile phones

T 5.97 Unauthorised transfer of data over mobile phones

T 5.98 Interception of mobile telephone calls

T 5.99 Analysis of call data relating to the use of mobile phones

T 5.100 Abuse of active contents on access to Lotus Notes/Domino

T 5.101 Hacking Lotus Notes/Domino

T 5.102 Sabotage

T 5.103 Misuse of webmail

T 5.104 Espionage

T 5.105 Disruption of archive system services

T 5.106 Unauthorised overwriting or deletion of archiving media

T 5.107 Disclosure of data to third parties by the outsourcing service provider

T 5.108 Exploitation of system-specific vulnerabilities in IIS - not to apply

T 5.109 Exploitation of system-specific vulnerabilities with Apache web server - not to apply

T 5.110 Web bugs

T 5.111 Misuse of active content in e-mails

T 5.112 Manipulation of ARP tables

T 5.113 MAC spoofing

T 5.114 Misuse of spanning tree

T 5.115 Overcoming the boundaries between VLANs

T 5.116 Tampering with the z/OS system configuration

T 5.117 Covering up tampering in z/OS

T 5.118 Obtaining high level rights in the RACF by unauthorised means

T 5.119 Use of other IDs in z/OS systems

T 5.120 Tampering with the Linux/zSeries system configuration

T 5.121 Attacks on z/OS systems using TCP/IP

T 5.122 Misuse of RACF attributes in z/OS

T 5.123 Bugging of indoor conversations using portable terminal devices

T 5.124 Misuse of information on portable terminal devices

T 5.125 Unauthorised transfer of data using portable terminal devices

T 5.126 Unauthorised photography and filming with portable terminal devices

T 5.127 Spyware - not to apply

T 5.128 Unauthorised data access by transferring code to an SAP system

T 5.129 Manipulation of data via the storage system

T 5.130 Manipulation of the configuration of a storage system

T 5.131 SQL injection

T 5.132 Compromising RPD user sessions under Windows server 2003 and higher

T 5.133 Unauthorized use of web-based administration tools

T 5.134 Lack of identification of communication partners

T 5.135 SPIT and Vishing

T 5.136 Abuse of freely accessible telephone extensions

T 5.137 Analysis of connection data relating to wireless communication

T 5.138 Attacks on WLAN components

T 5.139 Tapping of WLAN communication

T 5.140 Evaluation of residual information in printers, copiers, and all-in-one devices

T 5.141 Data theft via mobile data media

T 5.142 Spreading malicious software via mobile data media

T 5.143 Man-in-the-middle attack

T 5.144 Compromising of directory services due to unauthorised access

T 5.145 Manipulation of data and tools for patch and change management

T 5.146 Loss of confidentiality due to swap files

T 5.147 Unauthorised reading or disturbance of the virtualisation network

T 5.148 Misuse of virtualisation functions

T 5.149 Misuse of guest tools in virtual IT systems

T 5.150 Compromising the hypervisor of virtual IT systems

T 5.151 DNS flooding - denial-of-service attacks

T 5.152 DNS hijacking

T 5.153 DNS amplification attack

T 5.154 DNS information leakage

T 5.155 Exploitation of dynamic DNS updates

T 5.156 Bot networks

T 5.157 Phishing and pharming

T 5.158 Abuse of social networks

T 5.159 Creation of movement profiles using Bluetooth

T 5.160 Abuse of the Bluetooth profiles

T 5.161 Falsified responses to XDMCP broadcasts on terminal servers

T 5.162 Redirecting X-Window sessions

T 5.163 Attacks on Exchange systems

T 5.164 Misuse of programming interfaces in Outlook

T 5.165 Unauthorised access to or manipulation of data for web applications

T 5.166 Misuse of a web application due to automated use

T 5.167 Errors in the logic of web applications

T 5.168 Bypassing security functions of web applications implemented on the client side

T 5.169 Inadequate session management of web applications

T 5.170 Cross-Site Scripting (XSS)

T 5.171 Cross-Site Request Forgery (CSRF, XSRF, Session Riding)

T 5.172 Bypassing the authorisation in web applications

T 5.173 Integration of third party data and malicious code in web applications

T 5.174 Injection attacks

T 5.175 Clickjacking

T 5.176 Compromising the logged data transmission during centralised logging

T 5.177 Abuse of short URLs and QR codes