ATEN CS1182 Manuel d'utilisateur Page 12

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 27
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 11
page 11
4 Security Objectives
4.1 Security Objectives for the TOE
The following security objectives are intended to be satisfied by the TOE
O.CONF The TOE shall not violate the confidentiality of information
which it processes. Information generated within any
PERIPHERAL GROUP COMPUTER CONNECTION shall not
be accessible by any other PERIPHERAL GROUP with a
different GROUP ID.
O.INDICATE The AUTHORIZED USER shall receive an unambiguous
indication of which SWITCHED COMPUTER has been
selected.
O.ROM TOE software/firmware shall be protected against unauthorized
modification. Embedded software must be contained in
mask-programmed or one-time-programmable read-only
memory permanently attached (non-socketed) to a circuit
assembly.
O.SELECT An explicit action by the AUTHORIZED USER shall be used to
select the COMPUTER to which the shared set of
PERIPHERAL DEVICES is CONNECTED Single push button,
multiple push button, or rotary selection methods are used by
most (if not all) current market products. Automatic switching
based on scanning shall not be used as a selection mechanism.
O.SWITCH All DEVICES in a SHARED PERIPHERAL GROUP shall be
CONNECTED to at most one SWITCHED COMPUTER at a
time.
O.USBDETECT The TOE shall detect any USB connection that is not a pointing
device, keyboard, or display and will perform no interaction with
that device after the initial identification.
4.2 Security Objectives for the Environment
The following security objectives for the environment of the TOE must be satisfied in
order for the TOE to fulfill its own security objectives.
OE.ACCESS The AUTHORIZED USER shall possess the necessary privileges
Vue de la page 11
1 2 ... 7 8 9 10 11 12 13 14 15 16 17 ... 26 27

Commentaires sur ces manuels

Pas de commentaire