T 0.23 Unauthorised Access to IT Systems

In principle, each interface of an IT system includes not only the possibility to legally use particular services of this IT system pertaining to this interface, but also the risk of unauthorised access to the IT system via this interface.

Examples: