Threats Agents; Threats - Fuji Xerox C2265 Manual

Hide thumbs Also See for C2265:
Table of Contents

Advertisement

3.1.2.

Threats agents

This ST assumes the following four categories of threats agents as Attacker, each having
low-level attack capability and the disclosed information on TOE operations.
a)
Persons who are not permitted to use the TOE who may attempt to use the TOE.
b)
Persons who are authorized to use the TOE who may attempt to use TOE functions for
which they are not authorized.
c)
Persons who are authorized to use the TOE who may attempt to access data in ways for
which they are not authorized.
d)
Persons who unintentionally cause a software malfunction that may expose the TOE to
unanticipated threats.
3.1.3.

Threats

Table 7 identifies the threats addressed by the TOE. Unauthorized persons are assumed to be
the threat agents described in 3.1.2.
Threat
Affected asset
T.DOC.DIS
D.DOC
T.DOC.ALT
D.DOC
T.FUNC.ALT
D.FUNC
T.PROT.ALT
D.PROT
T.CONF.DIS
D.CONF
T.CONF.ALT
D.CONF
Fuji Xerox C2265/C2263
Table 7 Threats to User Data and TSF Data
Description
User Document Data may be disclosed to unauthorized
persons
User Document Data may be altered by unauthorized
persons
User Function Data may be altered by unauthorized
persons
TSF Protected Data may be altered by unauthorized
persons
TSF Confidential Data may be disclosed to
unauthorized persons
TSF Confidential Data may be altered by unauthorized
persons
- 26 -
Security Target
Copyright
2016 by Fuji Xerox Co., Ltd

Advertisement

Table of Contents
loading

This manual is also suitable for:

C2263

Table of Contents