| | 1 | = UhlLinuxServer Risk Assessment |
| | 2 | |
| | 3 | Tags: [[UhlLinuxServer]] [[Information_Governance_Category]] |
| | 4 | |
| | 5 | == 1 Illicit Access to Server |
| | 6 | |
| | 7 | === 1.1 Impact |
| | 8 | |
| | 9 | === 1.2 Likelihood |
| | 10 | |
| | 11 | === 1.3 Mitigation |
| | 12 | |
| | 13 | - Access via ssh is only allowed from within the University of Leicester |
| | 14 | |
| | 15 | === 1.4 Improvements |
| | 16 | |
| | 17 | == 2 Illicit Access to Data |
| | 18 | |
| | 19 | === 2.1 Impact |
| | 20 | |
| | 21 | === 2.2 Likelihood |
| | 22 | |
| | 23 | === 2.3 Mitigation |
| | 24 | |
| | 25 | === 2.4 Improvements |
| | 26 | |
| | 27 | == 3 Illicit Use of Data by Employees |
| | 28 | |
| | 29 | === 3.1 Impact |
| | 30 | |
| | 31 | === 3.2 Likelihood |
| | 32 | |
| | 33 | === 3.3 Mitigation |
| | 34 | |
| | 35 | === 3.4 Improvements |
| | 36 | |
| | 37 | == 4 Illicit Access to Software |
| | 38 | |
| | 39 | === 4.1 Impact |
| | 40 | |
| | 41 | === 4.2 Likelihood |
| | 42 | |
| | 43 | === 4.3 Mitigation |
| | 44 | |
| | 45 | === 4.4 Improvements |
| | 46 | |
| | 47 | == 5 Communication Interception |
| | 48 | |
| | 49 | === 5.1 Impact |
| | 50 | |
| | 51 | === 5.2 Likelihood |
| | 52 | |
| | 53 | === 5.3 Mitigation |
| | 54 | |
| | 55 | === 5.4 Improvements |
| | 56 | |
| | 57 | == 6 Software Security Vulnerability |
| | 58 | |
| | 59 | === 6.1 Impact |
| | 60 | |
| | 61 | === 6.2 Likelihood |
| | 62 | |
| | 63 | === 6.3 Mitigation |
| | 64 | |
| | 65 | === 6.4 Improvements |
| | 66 | |
| | 67 | == 7 Data Loss or Corruption |
| | 68 | |
| | 69 | === 7.1 Impact |
| | 70 | |
| | 71 | === 7.2 Likelihood |
| | 72 | |
| | 73 | === 7.3 Mitigation |
| | 74 | |
| | 75 | === 7.4 Improvements |
| | 76 | |
| | 77 | == 8 Software Loss or Corruption |
| | 78 | |
| | 79 | === 8.1 Impact |
| | 80 | |
| | 81 | === 8.2 Likelihood |
| | 82 | |
| | 83 | === 8.3 Mitigation |
| | 84 | |
| | 85 | === 8.4 Improvements |
| | 86 | |
| | 87 | [[BackLinks]] |