T 4 Threat catalogue Technical Failure
T 4.1 Disruption of power supply
T 4.2 Failure of internal supply networks
T 4.3 Failure of existing safety devices
T 4.4 Impairment of lines due to environmental factors
T 4.6 Voltage fluctuations / overvoltage / undervoltage
T 4.8 Discovery of software vulnerabilities - not to apply
T 4.9 Disruption of the internal power supply
T 4.10 Complexity of access possibilities to networked IT systems
T 4.11 Lack of authentication possibilities between NIS server and NIS client
T 4.12 Lack of authentication possibilities between X server and X client
T 4.14 Fading of special fax paper
T 4.15 Fax transmission errors
T 4.16 Fax transmission errors - not to apply
T 4.17 Technical defects on fax machines - not to apply
T 4.18 Discharged or fatigued emergency power supply in answering machines - not to apply
T 4.19 Information loss due to exhausted storage medium - not to apply
T 4.20 Overloaded information systems
T 4.21 Transient currents on shielding
T 4.22 Software vulnerabilities or errors
T 4.23 Automatic recognition of removable data media
T 4.24 File name conversion when backing up data under Windows 95 - not to apply
T 4.25 Still active connections
T 4.27 Circumvention of access control via ODBC
T 4.28 Loss of data in a database
T 4.29 Loss of data in a database caused by a lack of storage space - not to apply
T 4.30 Loss of database integrity/consistency
T 4.31 Failure or malfunction of a network component
T 4.32 Failure to dispatch a message
T 4.33 Poor-quality or missing authentication
T 4.34 Failure of a cryptomodule
T 4.35 Insecure cryptographic algorithms
T 4.36 Mistakes in encrypted data
T 4.37 Lack of reliability of groupware
T 4.38 Failure of components of a network management system or system management system
T 4.40 Unsuitable fitting out of the RAS client operational environment - not to apply
T 4.41 Non-availability of the mobile communication network
T 4.42 Failure of the mobile phone or PDA
T 4.44 Failure of Novell eDirectory
T 4.45 Delayed access to archive information
T 4.46 Poor synchronisation of index data during archiving
T 4.47 Obsolescence of cryptomethods
T 4.48 Failure of an outsourcing service provider's systems
T 4.49 Insecure default settings on routers and switches
T 4.50 z/OS operating system overload
T 4.51 Inadequate security mechanisms on PDAs
T 4.52 Loss of data when using a portable device
T 4.53 Insecure default settings for storage components
T 4.54 Loss of protection via the encrypting file system EFS
T 4.55 Data loss relating to password resets in Windows Server 2003/XP and higher
T 4.56 Failure of the VoIP architecture
T 4.57 Interferences relating to the use of VoIP over VPNs
T 4.58 Vulnerabilities relating to the use of VoIP end devices
T 4.59 Non-accessibility of VoIP due to NAT
T 4.60 Uncontrolled radio wave propagation
T 4.61 Unreliable or missing WLAN security mechanisms
T 4.62 Use of inadequate power outlet strips
T 4.64 Complexity of printers, copiers, and all-in-one devices
T 4.65 Inadequate protection of communication for printers and all-in-one devices
T 4.66 Impairment of health and environment due to printers, copiers, and all-in-one devices
T 4.67 Failure of directory services
T 4.68 Disruptions in an Active Directory due to unnecessary file replication
T 4.69 Problems with the IPSec configuration
T 4.70 Insecure default settings on VPN components
T 4.71 Problems when automating the distribution of patches and changes
T 4.72 Inconsistent databases in the trivial database format under Samba
T 4.74 Failure of IT components in a virtualised environment
T 4.75 Failure of the network infrastructure of virtualisation environments
T 4.76 Failure of administration servers for virtualisation systems
T 4.77 Resource bottlenecks due to improperly functioning guest tools in virtual environments
T 4.78 Failure of virtual machines due to unfinished data backup processes
T 4.79 Vulnerabilities in Bluetooth implementation
T 4.80 Poor-quality or missing Bluetooth security mechanisms
T 4.81 Extended rights due to program dialogues on terminal servers
T 4.82 Failed or unavailable terminal servers
T 4.83 Malfunctions of self-developed macros in Outlook
T 4.84 Inadequate validation of input and output data in web applications
T 4.85 Lack of or poor error handling by web applications
T 4.86 Inadequate traceability of security-related events in web applications
T 4.87 Disclosure of confidential information in web applications