Download  Print this page

Table 13: Threats To User Data; Table 14: Threats To Tsf Data; T Hreats - Xerox WorkCentre 5845 User Information

Multi-function device security target
Hide thumbs

Advertisement

Table of Contents
3.3.
Threats
3.3.1.
Threats Addressed by the TOE
This security problem definition addresses threats posed by four categories of
threat agents:
1. Persons who are not permitted to use the TOE who may attempt to
use the TOE
2. Persons who are authorized to use the TOE who may attempt to use
TOE functions for which they are not authorized.
3. Persons who are authorized to use the TOE who may attempt to
access data in ways for which they not authorized.
4. Persons who unintentionally cause a software malfunction that may
expose the TOE to unanticipated threats.
The threats and policies defined in this ST address the threats posed by
these threat agents. This section describes threats to assets described in
section 3.1.2.
Threat
Affected Asset
T.DOC.DIS
D.DOC
T.DOC.ALT
D.DOC
T.FUNC.ALT
D.FUNC
Threat
Affected Asset
T.PROT.ALT
D.PROT
T.CONF.DIS
D.CONF
T.CONF.ALT
D.CONF
3.3.2.
Threats Addressed by the IT Environment
There are no threats addressed by the IT Environment.
Copyright
Xerox Multi-Function Device Security Target

Table 13: Threats to user data

Description
User Document Data may be disclosed to
unauthorized persons
User Document Data may be altered by unauthorized
persons
User Function Data may be altered by unauthorized
persons

Table 14: Threats to TSF data

Description
TSF Protected Data may be altered by unauthorized
persons
TSF Confidential Data may be disclosed to
unauthorized persons
TSF Confidential Data may be altered by
unauthorized persons
23
2013 Xerox Corporation. All rights reserved.

Hide quick links:

Advertisement

Table of Contents
loading

  Related Manuals for Xerox WorkCentre 5845