Belkin® Secure DVI KVM Switch, Secure KM Switch and
Secure Windowing KVM EAL 4 augmented ALC_FLR.3 Security Target
4.3 Rationale
This section demonstrates that each threat, organizational security policy, and assumption are
mitigated by at least one security objective for the TOE, and that those security objectives
counter the threats, enforce the policies, and uphold the assumptions.
Threats,
Policies,
Assumptions
T.INVALIDUSB
●
T.RESIDUAL
T.ROM_PROG
T.TAMPER
T.INFECTED
T.SPOOF
T.PERIP
●
T.TRANSFER
A.ACCESS
A.MANAGE
A.NOEVIL
A.
PHYSICAL
Table 6: Sufficiency of Security Objectives
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
Rev. 1.01
Page | 30