~/Cedric
Cedric is a member since Fri May 18 09:53:17 2018 and is the creator of the following object(s):
7f9f1b8c-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Structure of the organisation. Threat: Disclosure. Vulnerability: The security policy is not applied
7f9f1d2b-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Structure of the organisation. Threat: Interception of compromising interference signals. Vulnerability: No monitoring of application of the security policy
7f9f9a23-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Intranet. Threat: Corruption of data. Vulnerability: No back-up procedure
7f9f1e29-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Structure of the organisation. Threat: Disclosure. Vulnerability: No monitoring of sensitive assets
7f9f1e9d-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Structure of the organisation. Threat: Tampering with hardware. Vulnerability: No identification of sensitive assets
7f9f2fa3-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Personnel. Threat: Tampering with hardware. Vulnerability: Personnel susceptible to enticement
7f9f17df-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Structure of the organisation. Threat: Illegal processing of data. Vulnerability: Responsibilities for information systems security not dealt with in the internal regulations
7f9f1a5c-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Structure of the organisation. Threat: Forging of rights. Vulnerability: The security policy is not applied
7f9f18ce-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Structure of the organisation. Threat: Saturation of the information system. Vulnerability: No incident monitoring to foresee failures or saturation (trend charts)
7f9f1bfc-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Structure of the organisation. Threat: Corruption of data. Vulnerability: No monitoring of application of the security policy
displaying 3921 - 3930 objects in total 5075