EasyManua.ls Logo

Zte ZXR10 M6000 Series - Security Problem Definition; Threat

Zte ZXR10 M6000 Series
57 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Chapter3
SECURITYPROBLEM
DEFINITION
InordertoclarifythenatureofthesecurityproblemthattheTOEisintendedtosolve,this
sectiondescribesthefollowing:
1.Anyknownorassumedthreatstotheassetsagainstwhichspecicprotectionwithin
theTOEoritsenvironmentisrequired
2.AnyorganizationalsecuritypolicystatementsorruleswithwhichtheTOEmustcomply
3.Anyassumptionsaboutthesecurityaspectsoftheenvironmentand/orofthemanner
inwhichtheTOEisintendedtobeused.
ThischapteridentiesthreatsasT.THREAT ,assumptionsasA.ASSUMPTIONandpolicies
asP .POLICY .
TableofContents
Threat........................................................................................................................3-1
Assumption................................................................................................................3-2
ORGANIZATIONALSECURITYPOLICIES................................................................3-3
3.1Threat
Athreatconsistsofathreatagent,anassetandanadverseactionofthatthreatagenton
thatasset.
1.Threatagentsareentitiesthatcanadverselyactonassetsthethreatagentsinthe
threatsbelowareunauthorizeduser,networkattacker,authorizeduserand
2.Assetsareentitiesthatsomeoneplacesvalueupontheassetsareaccesstonetwork
services,
3.Adverseactionsareactionsperformedbyathreatagentonanassettheadverse
actionsare:unauthorizedchangestoconguration,bothnetworkroutingconguration
andmanagementconguration.
Table3-1Threat
THREATDESCRIPTION
T.AUDIT_REVIEWActionsperformedbyusersmaynotbeknowntotheadministrators
duetoactionsnotbeingrecordedortheauditrecordsnotbeing
reviewedpriortothemachineshuttingdown,oranunauthorized
administratormodiesordestroysauditdata.
3-1
SJ-20110815105844-030|2011/08/19R1.6ZTECORPORATION

Table of Contents

Related product manuals