hit counter script

Secondary Assets; Assumptions; Table 9 Secondary Assets To Be Protected; Table 10 Operationala - Cisco Catalyst 4503-E Manual

Catalyst 4500 series
Hide thumbs Also See for Catalyst 4503-E:
Table of Contents

Advertisement

Cisco Cat4K NDPP ST
EDCS-1228241
Asset
The data which is provided by the TOE during security audit
logging.
Security properties to be maintained by the TOE: confidentiality,
availability, integrity.

3.3.2 Secondary Assets

The owner of the TOE presumably places value upon the following secondary entities.
All these secondary assets represent user data in the sense of the CC.
Asset
Auth data
Secondary asset, TSF data
The data which is used by the TOE to identify and authenticate the
external entities which interact with the TOE.
Security properties to be maintained by the TOE: confidentiality,
integrity, authenticity.
Crypto data
Secondary asset, TSF data
The data which is used by the TOE for digital signature handling and
encryption/decryption purposes.
Security properties to be maintained by the TOE: confidentiality,
integrity, authenticity.
Ctrl data
Secondary asset, TSF data
The data which is used by the TOE for firmware updates, firmware
registration, and firmware identity checking purposes.
Security properties to be maintained by the TOE: availability,
integrity.

3.4 Assumptions

The specific conditions listed in the following subsections are assumed to exist in the
TOE's environment. These assumptions include both practical realities in the
development of the TOE security requirements and the essential environmental
conditions on the use of the TOE.
Assumption
A.NO_GENERAL_PURPOSE It is assumed that there are no general-purpose
Asset Description

Table 9 Secondary assets to be protected

Asset Description
Table 10 Operational Assumptions
computing capabilities (e.g., compilers or user
applications) available on the TOE, other than
33
Assumption Definition
11 March 2014

Advertisement

Table of Contents
loading

Table of Contents