EasyManua.ls Logo

Fuji Xerox C2265 - Threats Agents; Threats

Fuji Xerox C2265
136 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Fuji Xerox C2265/C2263 Security Target
- 26 - Copyright
2016 by Fuji Xerox Co., Ltd
3.1.2. Threats agents
This ST assumes the following four categories of threats agents as Attacker, each having
low-level attack capability and the disclosed information on TOE operations.
a) Persons who are not permitted to use the TOE who may attempt to use the TOE.
b) Persons who are authorized to use the TOE who may attempt to use TOE functions for
which they are not authorized.
c) Persons who are authorized to use the TOE who may attempt to access data in ways for
which they are not authorized.
d) Persons who unintentionally cause a software malfunction that may expose the TOE to
unanticipated threats.
3.1.3. Threats
Table 7 identifies the threats addressed by the TOE. Unauthorized persons are assumed to be
the threat agents described in 3.1.2.
Table 7 Threats to User Data and TSF Data
Threat Affected asset Description
T.DOC.DIS D.DOC User Document Data may be disclosed to unauthorized
persons
T.DOC.ALT D.DOC User Document Data may be altered by unauthorized
persons
T.FUNC.ALT D.FUNC User Function Data may be altered by unauthorized
persons
T.PROT.ALT D.PROT TSF Protected Data may be altered by unauthorized
persons
T.CONF.DIS D.CONF TSF Confidential Data may be disclosed to
unauthorized persons
T.CONF.ALT D.CONF TSF Confidential Data may be altered by unauthorized
persons

Table of Contents

Related product manuals