~/Cedric
Cedric is a member since Fri May 18 09:53:17 2018 and is the creator of the following object(s):
7f9f2023-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Structure of the organisation. Threat: Remote spying. Vulnerability: No rules for protecting the exchange of confidential information
7f9f20e6-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Structure of the organisation. Threat: Eavesdropping. Vulnerability: No security policy for protecting the information processing infrastructure in the organisation's sites
7f9f1fc4-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Structure of the organisation. Threat: Theft or destruction of media, documents or equipment. Vulnerability: No security policy for protecting the information processing infrastructure in the organisation's sites
7f9f20ad-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Structure of the organisation. Threat: Breach of information system maintainability. Vulnerability: No security policy for protecting the information processing infrastructure in the organisation's sites
7f9f2636-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Subcontractors, suppliers, manufacturers. Threat: Forging of rights. Vulnerability: No protection of spaces dedicated to information exchange or sharing
7f9f2298-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Structure of the organisation. Threat: Failure of telecommunication equipment. Vulnerability: No installation standard for sites belonging to the organisation
7f9f2163-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Structure of the organisation. Threat: Saturation of the information system. Vulnerability: No rules imposing the use of standards
7f9f25a7-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Subcontractors, suppliers, manufacturers. Threat: Denial of actions. Vulnerability: Penalty or sanction clause out of proportion or not suited to the context
7f9f2415-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Structure of the organisation. Threat: Water damage. Vulnerability: No insurance cover for serious damage
7f9f26de-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Subcontractors, suppliers, manufacturers. Threat: Corruption of data. Vulnerability: No contractual clauses relating to the protection of IT equipment
displaying 3971 - 3980 objects in total 5075