~/Cedric
Cedric is a member since Fri May 18 09:53:17 2018 and is the creator of the following object(s):
7f9f2e25-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Personnel. Threat: Theft or destruction of media, documents or equipment. Vulnerability: Obtaining an advantage through disclosing information
7f9f29d5-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Subcontractors, suppliers, manufacturers. Threat: Failure of air-conditioning. Vulnerability: No contractual clauses covering compensation for damage in the event of loss of an essential service
7f9f2d98-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Personnel. Threat: Retrieval of recycled or discarded media. Vulnerability: No information or awareness concerning residual data on media
7f9f2bb1-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Personnel. Threat: Illegal processing of data. Vulnerability: No training to explain the conditions controlling the lawful use of information
7f9f2a7c-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Subcontractors, suppliers, manufacturers. Threat: Fire. Vulnerability: No security instructions given to external personnel working on the premises
7f9f2cf0-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Personnel. Threat: Tampering with hardware. Vulnerability: Obtaining an advantage through misinforming
7f9f2f87-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Personnel. Threat: Corruption of data. Vulnerability: Personnel susceptible to enticement
7f9f2c63-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Personnel. Threat: Corruption of data. Vulnerability: Failure to comply with the IT charter specifying the rules of use
7f9f3014-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Personnel. Threat: Eavesdropping. Vulnerability: Personnel susceptible to enticement
7f9f30bf-4f02-11e9-b3ea-0800277f0571 Risks
Asset: Personnel. Threat: Fraudulent copying or use of counterfeit software. Vulnerability: No management support for application of the security policy
displaying 4031 - 4040 objects in total 5075