T 4 Threat catalogue Technical Failure

T 4.1 Disruption of power supply

T 4.2 Failure of internal supply networks

T 4.3 Failure of existing safety devices

T 4.4 Impairment of lines due to environmental factors

T 4.5 Cross-talk

T 4.6 Voltage fluctuations / overvoltage / undervoltage

T 4.7 Defective data media

T 4.8 Discovery of software vulnerabilities - not to apply

T 4.9 Disruption of the internal power supply

T 4.10 Complexity of access possibilities to networked IT systems

T 4.11 Lack of authentication possibilities between NIS server and NIS client

T 4.12 Lack of authentication possibilities between X server and X client

T 4.13 Loss of stored data

T 4.14 Fading of special fax paper

T 4.15 Fax transmission errors

T 4.16 Fax transmission errors - not to apply

T 4.17 Technical defects on fax machines - not to apply

T 4.18 Discharged or fatigued emergency power supply in answering machines - not to apply

T 4.19 Information loss due to exhausted storage medium - not to apply

T 4.20 Overloaded information systems

T 4.21 Transient currents on shielding

T 4.22 Software vulnerabilities or errors

T 4.23 Automatic recognition of removable data media

T 4.24 File name conversion when backing up data under Windows 95 - not to apply

T 4.25 Still active connections

T 4.26 Failure of a database

T 4.27 Circumvention of access control via ODBC

T 4.28 Loss of data in a database

T 4.29 Loss of data in a database caused by a lack of storage space - not to apply

T 4.30 Loss of database integrity/consistency

T 4.31 Failure or malfunction of a network component

T 4.32 Failure to dispatch a message

T 4.33 Poor-quality or missing authentication

T 4.34 Failure of a cryptomodule

T 4.35 Insecure cryptographic algorithms

T 4.36 Mistakes in encrypted data

T 4.37 Lack of reliability of groupware

T 4.38 Failure of components of a network management system or system management system

T 4.39 Software design errors

T 4.40 Unsuitable fitting out of the RAS client operational environment - not to apply

T 4.41 Non-availability of the mobile communication network

T 4.42 Failure of the mobile phone or PDA

T 4.43 Undocumented functions

T 4.44 Failure of Novell eDirectory

T 4.45 Delayed access to archive information

T 4.46 Poor synchronisation of index data during archiving

T 4.47 Obsolescence of cryptomethods

T 4.48 Failure of an outsourcing service provider's systems

T 4.49 Insecure default settings on routers and switches

T 4.50 z/OS operating system overload

T 4.51 Inadequate security mechanisms on PDAs

T 4.52 Loss of data when using a portable device

T 4.53 Insecure default settings for storage components

T 4.54 Loss of protection via the encrypting file system EFS

T 4.55 Data loss relating to password resets in Windows Server 2003/XP and higher

T 4.56 Failure of the VoIP architecture

T 4.57 Interferences relating to the use of VoIP over VPNs

T 4.58 Vulnerabilities relating to the use of VoIP end devices

T 4.59 Non-accessibility of VoIP due to NAT

T 4.60 Uncontrolled radio wave propagation

T 4.61 Unreliable or missing WLAN security mechanisms

T 4.62 Use of inadequate power outlet strips

T 4.63 Dusty ventilators

T 4.64 Complexity of printers, copiers, and all-in-one devices

T 4.65 Inadequate protection of communication for printers and all-in-one devices

T 4.66 Impairment of health and environment due to printers, copiers, and all-in-one devices

T 4.67 Failure of directory services

T 4.68 Disruptions in an Active Directory due to unnecessary file replication

T 4.69 Problems with the IPSec configuration

T 4.70 Insecure default settings on VPN components

T 4.71 Problems when automating the distribution of patches and changes

T 4.72 Inconsistent databases in the trivial database format under Samba

T 4.73 Impaired software functionality due to compatibility problems with Windows Vista and Windows 7

T 4.74 Failure of IT components in a virtualised environment

T 4.75 Failure of the network infrastructure of virtualisation environments

T 4.76 Failure of administration servers for virtualisation systems

T 4.77 Resource bottlenecks due to improperly functioning guest tools in virtual environments

T 4.78 Failure of virtual machines due to unfinished data backup processes

T 4.79 Vulnerabilities in Bluetooth implementation

T 4.80 Poor-quality or missing Bluetooth security mechanisms

T 4.81 Extended rights due to program dialogues on terminal servers

T 4.82 Failed or unavailable terminal servers

T 4.83 Malfunctions of self-developed macros in Outlook

T 4.84 Inadequate validation of input and output data in web applications

T 4.85 Lack of or poor error handling by web applications

T 4.86 Inadequate traceability of security-related events in web applications

T 4.87 Disclosure of confidential information in web applications

T 4.88 Electrical power supply unsuitable for EMC

T 4.89 Lack of or insufficient alarm concept during logging