T 5.1 Manipulation or destruction of equipment or accessories

External as well as internal perpetrators may try to manipulate or destroy equipment, accessories, documents, or other data media (e.g. DVDs or USB sticks) or other such items for various reasons (revenge, ill will, frustration). The impact of such manipulations becomes even greater the later they are detected, the greater the skills and knowledge of the perpetrator, and the deeper the impact on a given workflow. The effects range from unauthorised reading of data worthy of protection to the destruction of data media or IT systems, which may lead to significant downtimes.

Example: