BSI Elementary Hazards
BSI Elementary Hazards
Elementary hazards
Table of contents
G 0.1 Fire........................................................................................................................................................................4
G 0.2 Unfavorable climatic conditions ..........................................................................................................................5
G 0.3 Water.....................................................................................................................................................................6
G 0.4 Pollution, dust, corrosion .....................................................................................................................................7
G 0.5 Natural disasters .....................................................................................................................................................8
G 0.6 Disasters in the environment................................................................................................................................9
G 0.7 Major events in the surrounding area.................................................................................................................10
G 0.8 Power supply failure or malfunction..................................................................................................................11
G 0.9 Failure or malfunction of communication networks ..........................................................................................12
G 0.10 Failure or disruption of supply networks .........................................................................................................13
G 0.11 Failure or disruption of service providers ........................................................................................................14
G 0.12 Electromagnetic interference radiation ............................................................................................................15
G 0.13 Interception of compromising radiation ..........................................................................................................16
G 0.14 Spying out information (espionage).................................................................................................................17
G 0.15 Listening ...........................................................................................................................................................18
G 0.16 Theft of devices, data carriers or documents...............................................................................................19
G 0.17 Loss of equipment, data carriers or documents...........................................................................................20
G 0.18 Misplanning or lack of adaptation ...................................................................................................................21
G 0.19 Disclosure of information requiring protection ...............................................................................................22
G 0.20 Information or products from unreliable source..............................................................................................23
G 0.21 Manipulation of hardware or software ............................................................................................................24
G 0.22 Manipulation of information ........................................................................................................................25
G 0.23 Unauthorized intrusion into IT systems ..........................................................................................................26
G 0.24 Destruction of equipment or data carriers ...................................................................................................27
G 0.25 Failure of equipment or systems......................................................................................................................28
G 0.26 Malfunction of devices or systems ..................................................................................................................29
G 0.27 Lack of resources ..............................................................................................................................................30
G 0.28 Software vulnerabilities or errors ....................................................................................................................31
G 0.29 Violation of laws or regulations.......................................................................................................................32
G 0.30 Unauthorized use or administration of devices and systems .....................................................................33
G 0.31 Incorrect use or administration of devices and systems .............................................................................34
G 0.32 Misuse of authorizations ..................................................................................................................................35
G 0.33 Personnel absence .............................................................................................................................................36
G 0.34 Stop ..................................................................................................................................................................37
G 0.35 Coercion, extortion or corruption ....................................................................................................................38
G 0.36 Identity theft......................................................................................................................................................39
G 0.1 Fire
Fires can cause severe damage to people, buildings and their equipment. In addition to direct damage
caused by fire, consequential damage can be identified that can reach catastrophic proportions in terms of its
damaging effect on information technology in particular.
Extinguishing water damage, for example, does not only occur at the site of the fire. They can also occur in
lower lying parts of the building. When PVC burns, chlorine gases are produced which, together with the
humidity in the air and the extinguishing water, form hydrochloric acid. If the hydrochloric acid vapors are
dispersed through the air conditioning system, damage can be caused in this way to sensitive electronic
equipment located in a part of the building far from the site of the fire. But "normal" fire smoke can also
have a damaging effect on IT equipment in this way.
A fire is caused not only by the negligent handling of fire (e.g. unsupervised open flames, welding and
soldering work), but also by the improper use of electrical equipment (e.g. unsupervised coffee machine,
overloading multiple sockets). Technical defects in electrical equipment can also lead to a fire.
The spread of a fire can be favored by, among other things:
• Holding up fire section doors with wedges,
• improper storage of combustible materials (e.g. waste paper),
• Failure to comply with relevant fire prevention standards and regulations,
• Lack of fire detection equipment (e.g., smoke detectors),
• missing or inoperable hand-held fire extinguishers or automatic extinguishing devices (e.g. gas
extinguishing systems),
• inadequate preventive fire protection (e.g. lack of fire barriers on cable routes or use of unsuitable
insulation materials for heat and sound insulation).
Examples:
• In the early 1990s, a major data center in the Frankfurt area suffered catastrophic fire damage that
led to a complete outage.
• It happens again and again that small electrical appliances, such as coffee machines or table lamps, are
improperly installed or set up, causing fires.
G 0.3 Water
Water can affect the integrity and availability of information stored on analog and digital data carriers.
Information in the working memory of IT systems is also at risk. The uncontrolled entry of water into
buildings or rooms can be caused, for example, by:
• Disturbances in the water supply or sewage disposal,
• Defects of the heating system,
• Defects in air conditioners with water connection,
• Defects in sprinkler systems,
• Extinguishing water in firefighting and
• Water sabotage, e.g., by opening faucets and clogging drains.
Regardless of how water gets into buildings or rooms, there is a risk that supply facilities or IT components
will be damaged or put out of operation (short circuit, mechanical damage, rust, etc.). Especially if central
facilities of the building supply (main distribution boards for electricity, telephone, data) are located in basement
rooms without automatic drainage, penetrating water can cause very high damages.
Problems can also arise due to frost. For example, pipes in frost-prone areas can leak if water in them
stands still during prolonged frost. Existing thermal insulation is also overcome by frost over time.
Example:
• In a server room, a water pipe ran underneath the ceiling, which was covered with plasterboard
elements. When a connection of the water pipe started leaking, this was not detected in time. The
leaking water initially collected at the lowest point of the cladding before it escaped there and caused a
short circuit in the power distributor installed below. As a result, both the water and the power supply to
the affected part of the building had to be completely shut down until the final repairs were made.
G 0.15 Listening
Eavesdropping refers to targeted attacks on communications links, conversations, noise sources of all kinds, or IT
systems to gather information. This starts with unnoticed, clandestine eavesdropping on a conversation
and extends to highly engineered complex attacks to intercept signals sent via radio or lines, e.g. with the help
of antennas or sensors.
Not only because of the low risk of detection, eavesdropping on cables or radio connections is a threat to
information security that should not be neglected. Basically, there are no cables that are tap-proof. The only
difference between cables is the effort required to tap them. Whether a line is actually being tapped can only
be determined with a great deal of metrological effort.
The unprotected transmission of authentication data is particularly critical in the case of plain-text protocols such
as HTTP, FTP or Telnet, as these are easy to analyze automatically due to the clear structure of the data.
The decision to intercept information somewhere is essentially determined by the question of whether the
information is worth the technical or financial effort and the risk of discovery.
The answer to this question depends very much on the individual capabilities and interests of the attacker.
Examples:
• In the case of telephone calls, it is not only the eavesdropping on conversations that can be of interest to an
attacker. The information transmitted during signaling can also b e misused by an attacker, e.g., if a
faulty setting in the terminal device causes the password to be transmitted in clear text during logon.
• In the case of unprotected or insufficiently protected radio transmission (e.g., if a WLAN is only secured
with WEP), an attacker can easily eavesdrop on the entire communication.
• E-mails can be read throughout their journey through the network if they are not encrypted.
Unencrypted e-mails should therefore not be compared with classic letters, but with postcards.
G 0.34 Stop
An attack can threaten a n institution, specific areas of the institution, or individuals. There are many
technical ways to carry out an attack: thrown bricks, explosion by explosives, use of firearms, arson. Whether and
to what extent an institution is exposed to the risk of an attack depends not only on the location and environment
of the building but also to a large extent on its tasks and the political-social climate. Companies and government
agencies that operate in areas of political controversy are more at risk than others. Institutions near
common demonstration staging areas are more at risk than those in remote locations. In Germany, the state
criminal investigation offices or the Federal Criminal Police Office can be consulted for advice on
assessing the threat or in the event of suspected threats from politically motivated attacks.
Examples:
• In the 1980s, an explosive attack was carried out on the data center of a major federal authority in
Cologne. The high impact of the explosive device destroyed not only windows and walls, but also many
IT systems in the data center.
• The attack on the World Trade Center in New York on September 11, 2001, not only killed many
people, but also destroyed numerous IT facilities. As a result, several companies experienced
considerable difficulties in continuing their business operations.
G 0.41 Sabotage
Sabotage refers to the deliberate manipulation or damage of objects or processes with the aim of causing
damage to the victim. Data centers or communication links of authorities or companies can b e particularly
attractive targets, since a great effect can be achieved here with relatively small means.
The complex infrastructure of a data center can be manipulated selectively to cause operational
disruptions by deliberately influencing important components, possibly by perpetrators from the
outside, but above all by internal perpetrators. Particularly at risk are inadequately protected technical
building or communications infrastructures and central supply points that may not be monitored from an
organizational or technical perspective and are easily accessible to external parties without being observed.
Examples:
• In a large data center, tampering with the UPS led to a temporary total failure. The perpetrator had
repeatedly switched the UPS to bypass manually and then manipulated the building's main power supply. In
total, four outages took place in three years. In some cases, there was even hardware damage. The service
interruptions lasted between 40 and 130 minutes.
• Sanitary facilities were also housed within a data center. By clogging the drains and opening the water
supply at the same time, water penetrated central technical components. The damage caused in this way led
to interruptions in the operation of the productive system.
• Sabotage p o s e s a particular risk for electronic archives, as many documents worthy of protection are
usually stored in a small space. Under certain circumstances, this can cause a great deal of damage
through targeted, low-effort manipulation.