T 5 Threat catalogue Deliberate Acts
T 5.1 Manipulation or destruction of equipment or accessories
T 5.2 Manipulation of information or software
T 5.3 Unauthorised entry into a building
T 5.9 Unauthorised use of IT systems
T 5.10 Abuse of remote maintenance ports
T 5.11 Loss of confidentiality of data stored in PBX systems
T 5.12 Interception of telephone calls and data transmissions
T 5.13 Wiretapping of rooms using PBX terminal devices
T 5.15 Abuse of features of PBX systems
T 5.16 Threat during maintenance/administration work
T 5.17 Threat posed by external staff during maintenance work - not to apply
T 5.18 Systematic trying-out of passwords
T 5.20 Misuse of administrator rights
T 5.22 Theft of a mobile IT system
T 5.26 Analysis of the message flow
T 5.27 Repudiation of a message
T 5.29 Unauthorised copying of data media
T 5.30 Unauthorised use of fax machine or fax server
T 5.31 Unauthorised reading of incoming fax transmissions
T 5.32 Evaluation of residual information in fax machines and fax servers
T 5.33 Sending faxes under a false identity
T 5.34 Deliberate re-programming of the destination keys on fax machines
T 5.35 Overload due to incoming fax transmissions
T 5.36 Deliberate overloading of answering machines - not to apply
T 5.37 Determining access codes - not to apply
T 5.38 Misuse of remote inquiry - not to apply
T 5.39 Infiltrating computer systems via communication cards
T 5.40 Monitoring rooms using computers equipped with microphones and cameras
T 5.41 Misuse of an UNIX system with the help of UUCP
T 5.44 Abuse of remote access ports for management functions of private branch exchanges
T 5.45 Trying out passwords under WfW and Windows 95 - not to apply
T 5.46 Masquerading under WfW - not to apply
T 5.47 Deleting the post office under WfW - not to apply
T 5.49 Abuse of source routing
T 5.50 Abuse of the ICMP protocol
T 5.51 Abuse of routing protocols
T 5.52 Misuse of administrator rights in Windows operating systems
T 5.53 Deliberate misuse of protective cabinets for reasons of convenience
T 5.54 Deliberately causing an Abnormal End - not to apply
T 5.55 Login bypass - not to apply
T 5.56 Temporary free-access accounts - not to apply
T 5.58 Hacking Novell Netware - not to apply
T 5.59 Misuse of administrator rights in the Novell Netware network 3.x - not to apply
T 5.60 By-passing system guidelines - not to apply
T 5.61 Misuse of remote access to management functions on routers
T 5.62 Misuse of resources via remote IT systems - not to apply
T 5.63 Manipulation via the ISDN D-channel
T 5.64 Manipulation of data or software in database systems
T 5.65 Denial of services in a database system
T 5.66 Unauthorised connection of IT systems to a network
T 5.67 Unauthorised execution of network management functions
T 5.68 Unauthorised access to active network components
T 5.69 Higher risk of theft from a working place at home
T 5.70 Manipulation by family members or visitors
T 5.71 Loss of confidentiality of classified information
T 5.73 Impersonation of wrong sender
T 5.74 Manipulation of alias files and distribution lists - not to apply
T 5.75 Overload due to incoming e-mails
T 5.76 Mail bombs - not to apply
T 5.77 Unauthorised monitoring of emails
T 5.79 Unauthorised acquisition of administrator rights under Windows systems
T 5.81 Unauthorized use of a cryptomodule
T 5.82 Manipulation of a cryptomodule
T 5.83 Compromising cryptographic keys
T 5.85 Loss of integrity of information that should be protected
T 5.86 Manipulation of management parameters
T 5.88 Abuse of active content
T 5.89 Hijacking of network connections
T 5.90 Manipulation of address books and distribution lists
T 5.91 Disabling of RAS access security mechanisms - not to apply
T 5.92 Use of the VPN client as a VPN server
T 5.93 Permitting use of VPN components by third parties
T 5.95 Bugging of indoor conversations over mobile phones
T 5.96 Tampering with mobile phones
T 5.97 Unauthorised transfer of data over mobile phones
T 5.98 Interception of mobile telephone calls
T 5.99 Analysis of call data relating to the use of mobile phones
T 5.100 Abuse of active contents on access to Lotus Notes/Domino
T 5.101 Hacking Lotus Notes/Domino
T 5.105 Disruption of archive system services
T 5.106 Unauthorised overwriting or deletion of archiving media
T 5.107 Disclosure of data to third parties by the outsourcing service provider
T 5.108 Exploitation of system-specific vulnerabilities in IIS - not to apply
T 5.109 Exploitation of system-specific vulnerabilities with Apache web server - not to apply
T 5.111 Misuse of active content in e-mails
T 5.112 Manipulation of ARP tables
T 5.114 Misuse of spanning tree
T 5.115 Overcoming the boundaries between VLANs
T 5.116 Tampering with the z/OS system configuration
T 5.117 Covering up tampering in z/OS
T 5.118 Obtaining high level rights in the RACF by unauthorised means
T 5.119 Use of other IDs in z/OS systems
T 5.120 Tampering with the Linux/zSeries system configuration
T 5.121 Attacks on z/OS systems using TCP/IP
T 5.122 Misuse of RACF attributes in z/OS
T 5.123 Bugging of indoor conversations using portable terminal devices
T 5.124 Misuse of information on portable terminal devices
T 5.125 Unauthorised transfer of data using portable terminal devices
T 5.126 Unauthorised photography and filming with portable terminal devices
T 5.127 Spyware - not to apply
T 5.128 Unauthorised data access by transferring code to an SAP system
T 5.129 Manipulation of data via the storage system
T 5.130 Manipulation of the configuration of a storage system
T 5.132 Compromising RPD user sessions under Windows server 2003 and higher
T 5.133 Unauthorized use of web-based administration tools
T 5.134 Lack of identification of communication partners
T 5.136 Abuse of freely accessible telephone extensions
T 5.137 Analysis of connection data relating to wireless communication
T 5.138 Attacks on WLAN components
T 5.139 Tapping of WLAN communication
T 5.140 Evaluation of residual information in printers, copiers, and all-in-one devices
T 5.141 Data theft via mobile data media
T 5.142 Spreading malicious software via mobile data media
T 5.143 Man-in-the-middle attack
T 5.144 Compromising of directory services due to unauthorised access
T 5.145 Manipulation of data and tools for patch and change management
T 5.146 Loss of confidentiality due to swap files
T 5.147 Unauthorised reading or disturbance of the virtualisation network
T 5.148 Misuse of virtualisation functions
T 5.149 Misuse of guest tools in virtual IT systems
T 5.150 Compromising the hypervisor of virtual IT systems
T 5.151 DNS flooding - denial-of-service attacks
T 5.153 DNS amplification attack
T 5.154 DNS information leakage
T 5.155 Exploitation of dynamic DNS updates
T 5.158 Abuse of social networks
T 5.159 Creation of movement profiles using Bluetooth
T 5.160 Abuse of the Bluetooth profiles
T 5.161 Falsified responses to XDMCP broadcasts on terminal servers
T 5.162 Redirecting X-Window sessions
T 5.163 Attacks on Exchange systems
T 5.164 Misuse of programming interfaces in Outlook
T 5.165 Unauthorised access to or manipulation of data for web applications
T 5.166 Misuse of a web application due to automated use
T 5.167 Errors in the logic of web applications
T 5.168 Bypassing security functions of web applications implemented on the client side
T 5.169 Inadequate session management of web applications
T 5.170 Cross-Site Scripting (XSS)
T 5.171 Cross-Site Request Forgery (CSRF, XSRF, Session Riding)
T 5.172 Bypassing the authorisation in web applications
T 5.173 Integration of third party data and malicious code in web applications
T 5.176 Compromising the logged data transmission during centralised logging