T 0.30 Unauthorised Use or Administration of Devices and Systems

Without appropriate mechanisms for entry, admission and access control, unauthorised use of devices and systems virtually can neither be prevented nor detected. The basic mechanism IT systems use for this is user identification and authentication. But even in IT systems with a strong identification and authentication mechanisms, unauthorised access is still conceivable, if the corresponding security features (passwords, chip cards, tokens, etc.) fall into the wrong hands. Also, when assigning and maintaining permissions, many mistakes can be made, for example, if authorisations are granted too liberally or given to unauthorised persons, or if they are not regularly updated.

When granted illegal access to devices and systems, unauthorised persons can intercept confidential information, carry out manipulation or cause disruptions.

A particularly prominent special case of unauthorised use is unauthorised administration. If unauthorised persons change the configuration or operating parameters of the hardware or software components, severe damage can be the consequence of such action.

Examples: