
4. ASSUMPTIONS
4.1 Physical Security Assumptions
A key environmental assumption is physical security, for it is assumed appropriate
physical security protection will be applied to the TOE hardware commensurate with the
value of the IT assets. Specifically, the TOE is assumed to be located within a facility
providing controlled (i.e., employee-only) access to prevent unauthorized physical access
to internal parts of the TOE.
4.2 Personnel Security Assumptions
It is assumed that an authorized user possesses the necessary privileges to access the
information transferred by the TOE – users are authorized users. It is also assumed that
the TOE is installed and managed in accordance with the manufacturer’s directions. It is
assumed that the authorized user is non-hostile and follows all usage guidance.
4.3 Operational Security Assumptions
It is assumed that the TOE meets the appropriate national requirements (in the country
where used) for conducted/radiated electromagnetic emissions. [In the United States Part
15 of the FCC Rules for Class B digital devices]. It is also assumed that only the selected
computer’s video channel will be visible on the shared monitor. It is assumed that
vulnerabilities associated with the attached devices (shared peripherals or switched
computers), or their connection to the TOE, are a concern of the application scenario and
not of the TOE.
4.4 Threats Countered and Not Countered
The TOE is designed to fully or partially counter the following threats:
The TOE may be bypassed, circumventing nominal SWITCH functionality
The TOE may be delivered and installed in a manner which violates the
security policy.
The functionality of the TOE may be changed by reprogramming in such a
way as to violate the security policy.
A physical attack on the TOE may violate the security policy.
RESIDUAL DATA may be transferred between PERIPHERAL PORT
GROUPS with different IDs.
Via intentional or unintentional actions, a USER may think the set of
SHARED PERIPHERALS are CONNECTED to one COMPUTER when in
fact they are connected to a different one.
STATE INFORMATION may be transferred to a PERIPHERAL PORT
Comentários a estes Manuais