Aruba 620 Especificações Página 60

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 93
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 59
Security Target Version 1.0 9/29/2014
60
determine the vulnerabilities that have been found in WLAN Access System products in general,
as well as those that pertain to the particular TOE. The evaluator documents the sources consulted
and the vulnerabilities found in the report. For each vulnerability found, the evaluator either
provides a rationale with respect to its non-applicability, or the evaluator formulates a test (using
the guidelines provided in ATE_IND) to confirm the vulnerability, if suitable. Suitability is
determined by assessing the attack vector needed to take advantage of the vulnerability. For
example, if the vulnerability can be detected by pressing a key combination on boot-up, for
example, a test would be suitable at the assurance level of this PP. If exploiting the vulnerability
requires an electron microscope and a tank of liquid nitrogen, for instance, then a test would not be
suitable and an appropriate justification would be formulated.
Vista de página 59
1 2 ... 55 56 57 58 59 60 61 62 63 64 65 ... 92 93

Comentários a estes Manuais

Sem comentários