
Cisco Aggregation Services Router (ASR) 901 Series Security Target
Page 22 of 50
A user may gain unauthorized access to the TOE data and TOE
executable code. A malicious user, process, or external IT entity may
masquerade as an authorized entity in order to gain unauthorized
access to data or TOE resources. A malicious user, process, or external
IT entity may misrepresent itself as the TOE to obtain identification
and authentication data.
A malicious party attempts to supply the end user with an update to the
product that may compromise the security features of the TOE.
User data may be inadvertently sent to a destination not intended by
the original sender.
3.3 Organizational Security Policies
The following table lists the Organizational Security Policies imposed by an organization to
address its security needs.
Table 12 Organizational Security Policies
The TOE shall display an initial banner describing restrictions of use, legal agreements,
or any other appropriate information to which users consent by accessing the TOE.
Comentarios a estos manuales