| Man |
- Functions incorrectly
- Not present
- Not employed
|
Drop:
- Foreseeable (dismissal, vacation)
- Unforeseeable (illness, death, accident, strike) |
| |
Unintentional misconduct:
- Ignorance, sloppiness
- Faulty procedures
- Complex error-prone operation
- Careless ..... |
| |
Intentional misconduct:
- Not working according to regulations/procedures
- Fraud/theft/information leakage
- Unauthorized ..... |
| |
|
|
| Equipment |
- Functions incorrectly
- Disturbs
- Is lost or severely damaged
|
Spontaneous technical failure:
- Aging/wear
- Malfunction
- Design/manufacturing/installation/maintenance errors |
| |
Technical failure due to external influences:
- Power outage
- Poor climate control
- Negligent ...... |
| |
Human actions/failures:
- Installation error
- Wrong settings
- Operating errors
- Intentional .......... |
| |
|
|
| Software |
- Functions incorrectly
- Crashes or delayed execution
- Gets lost or becomes serious
|
Negligent human acts:
- Design, programming, implementation, management/maintenance errors
- Introduction of virus and the like. by using unscreened programs
- Using the wrong version of software
- Poor documentation |
| |
Unintentional human acts:
- Errors due to incorrect following of procedures
- Installation of malware and viruses due to the use of incorrect authorizations |
| |
Deliberate human acts:
- Manipulation before or after commissioning
- (Unauthorized) change of function and/or addition
- Installation of viruses, Trojans, and similar
- Hijacking of ...... |
| |
Technical errors/defects:
- Errors in code software that disrupt operation
- Backdoors in software for (unauthorized) access
- Bugs/errors in code that could lead to exploits |
| |
Organizational errors:
- Supplier goes bankrupt
- Not a good ..... |
| |
|
|
| Details |
- Are unjustly disclosed
- Are temporarily inaccessible
- Lost
|
Via data carriers (CD/DVD/USB sticks/Hard disk/Backups/mobile devices):
- Theft/misplacement/leaks
- Damage due to mishandling
- Mismatched file formats
- Faulty or no encryption
- Erroneous or falsified |
| |
Via Cloud services:
- Unauthorized access by unauthorized parties (hackers/hosters)
- Unauthorized ..... |
| |
Via equipment:
- Physical writing or reading errors
- Insufficient access restriction to equipment
- Errors in ..... |
| |
Via software:
- Faulty or manipulated software
- Effects ..... |
| |
Through people:
- (Un)intentional incorrect data entry, change or deletion of data
- Unauthorized ..... |
| |
|
|
| Organization |
- Does not work according to established principles
- Reorganizes
- Merges or is dissolved
|
User organization:
- Mismanagement
- Poor allocation of tasks, powers, responsibilities
- Unclear or missing codes of conduct
- Absent, outdated, or unclear manuals/system documentation/work procedures
- Insufficient ...... |
| |
Management organization:
- Poor management policies
- Insufficient ...... |
| |
Development organization:
- Poor project management
- Not ........ |
| |
|
|
| Surroundings |
- Is accessible to unauthorized persons
- Is damaged
- Is destroyed or severely damaged
|
Housing:
- Unauthorized access to building(s)
- Theft in workplaces
- ....... |
| |
Now:
- Failure of electricity, water, telephone
- ....... |
| |
Outside events:
- Natural disasters (flood, lightning, storm, earthquake, etc.)
- Other ....... |
| |
|
|
| Services |
- Are not delivered as agreed
- Temporarily undeliverable
- Definitively no longer available
|
Services are not provided as agreed:
- Poorly trained staff
- High staff turnover
- Insufficient capacity in staff
- ...... |
| |
Service provider services temporarily unavailable:
- Does not provide services in accordance with the agreement
- ...... |
| |
Services service provider will no longer be able to provide permanently:
- A service provider goes bankrupt
- ..... |