1.2.2 System; 1.2.3 Cryptography - Red Hat CERTIFICATE SYSTEM 7.1 - ADMINISTRATOR Administrator's Manual

Hide thumbs Also See for CERTIFICATE SYSTEM 7.1 - ADMINISTRATOR:
Table of Contents

Advertisement

1.2 Threats
T. User error makes data inaccessible
User accidentally deletes user data rendering user data inaccessible.
T. Administrators, Operators, Officers and Auditors commit errors or hostile
actions
An Administrator, Operator, Officer or Auditor commits errors that change the intended
security policy of the system or application or maliciously modify the system's
configuration to allow security violations to occur.

1.2.2 System

T. Critical system component fails
Failure of one or more system components results in the loss of system critical
functionality.
T. Malicious code exploitation
An authorized user, IT system, or hacker downloads and executes malicious code, which
causes abnormal processes that violate the integrity, availability, or confidentiality of the
system assets.
T. Message content modification
A hacker modifies information that is intercepted from a communications link between two
unsuspecting entities before passing it on to the intended recipient.
T. Flawed code
A system or applications developer delivers code that does not perform according to
specifications or contains security flaws.

1.2.3 Cryptography

T. Disclosure of private and secret keys
A private or secret key is improperly disclosed.
718
Red Hat Certificate System Administrator's Guide • September 2005

Advertisement

Table of Contents
loading

This manual is also suitable for:

Certificate system 7.1 - adminsistrator

Table of Contents