1.1.2 Physical Assumptions; 1.1.3 Connectivity Assumptions; 1.2 Threats; 1.2.1 Authorized Users - Netscape MANAGEMENT SYSTEM 6.1 - ADMINISTRATOR Administrator's Manual

Table of Contents

Advertisement

1.2 Threats

1.1.2 Physical Assumptions

A. Communications Protection
The system is adequately physically protected against loss of communications i.e.,
availability of communications.
A. Physical Protection
The TOE hardware, software, and firmware critical to security policy enforcement
will be protected from unauthorized physical modification.

1.1.3 Connectivity Assumptions

A. Operating System
The operating system has been selected to provide the functions required by this
CIMC to counter the perceived threats for the appropriate Security Level identified
in this family of PPs ( This assumption has been copied directly from the CIMC PP.
In the context of this ST, "appropriate Security Level identified in this family of
PPs" reflects Security Level 3 as represented by this ST).
1.2 Threats
The threats are organized in four categories: authorized users, system,
cryptography, and external attacks.

1.2.1 Authorized Users

T. Administrative errors of omission
Administrators, Operators, Officers or Auditors fail to perform some function
essential to security.
T. User abuses authorization to collect and/or send data
User abuses granted authorizations to improperly collect and/or send sensitive or
security-critical data.
Appendix E
Common Criteria Environment: TOE Security Environment Assumptions
707

Advertisement

Table of Contents
loading

This manual is also suitable for:

Certificate management system 6.1

Table of Contents