
Cisco Intrusion Prevention System Security Target
This security objective is necessary to counter the threat
T.UNAUTHORIZED_UPDATE to ensure the end user has not installed a
malicious update, thinking that it was legitimate.
This security objective is necessary to counter the
T.UNDETECTED_ACTIONS to ensure activity is monitored so the security
of the TOE is not compromised.
This security objective is necessary to address the Organization Security
Policy P.ACCESS_BANNER to ensure an advisory notice and consent
warning message regarding unauthorized use of the TOE is displayed before
the session is established.
This security objective is necessary to counter the T.ADMIN_ERROR that
ensures actions performed on the TOE are logged so that indications of a
failure or compromise of a TOE security mechanism are known and
corrective actions can be taken.
O.RESIDUAL_INFORMATION_
CLEARING
This security objective is necessary to counter the threat
T.USER_DATA_REUSE so that data traversing the TOE could inadvertently
be sent to a user other than that intended by the sender of the original
network traffic.
This security objective is necessary to counter the threat:
T.RESOURCE_EXHAUSTION to mitigate a denial of service, thus ensuring
resources are available.
This security objective is necessary to counter the threat:
T.UNAUTHORIZED_ACCESS to ensure accounts cannot be compromised
and used by an attacker that does not otherwise have access to the TOE.
This security objective is necessary to counter the threat T.TSF_FAILURE to
ensure failure of mechanisms do not lead to a compromise in the TSF.
4.3.3 Security objectives conclusion
The tracing of the security objectives to assumptions, threats, and OSPs, and the justification of
that tracing showed that all the given assumptions are upheld, all the given threats are countered,
all the given OSPs are enforced, and the security problem as defined in the SPD is solved.
Comentarios a estos manuales