~/Cedric
Cedric is a member since Fri May 18 09:53:17 2018 and is the creator of the following object(s):
7f9f0f04-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Structure of the organisation. Threat: Destruction of equipment or supports. Vulnerability: No rules for the use and storage of hardware and information media (protection conditions during transport, smoking ban, etc.)
7f9f0dde-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Structure of the organisation. Threat: Theft or destruction of media, documents or equipment. Vulnerability: No organisation for management of security incidents
7f9f10c3-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Structure of the organisation. Threat: Fire. Vulnerability: No fire-fighting organisation (description of roles and responsibilities)
7f9f1184-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Structure of the organisation. Threat: Fire. Vulnerability: No management of emergency equipment inspection reports
7f9f1229-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Structure of the organisation. Threat: Forging of rights. Vulnerability: Possibility of using the organisation's resources without supervision (self-service equipment, etc.)
No instructions for avoiding the use of IT resources in a manner that leads to saturation of storage spaces or processing resources. Vulnerabilities
7f9f0589-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Structure of the organisation. Threat: Illegal processing of data. Vulnerability: No instructions relating to incidents (detection, action, etc.)
7f9f0f2a-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Structure of the organisation. Threat: Destruction of equipment or supports. Vulnerability: No insurance cover for destruction of equipment
7f9f0d4c-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Structure of the organisation. Threat: Data from untrustworthy sources. Vulnerability: No structure allowing identification of a person to be guaranteed within the organisation or a project
7f9f08f2-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Structure of the organisation. Threat: Saturation of the information system. Vulnerability: No policy for checking the correct sizing of the equipment of the information processing infrastructure, including the emergency equipment
displaying 3851 - 3860 objects in total 5075