Identifier | Admin |
Descriptive Name | System administrator |
Description | This category covers installation, operation, maintenance, and replacement of the TOE. It includes both well-intended and hostile administrators. |
Editorial | Undetermined: whether this category should include application administrators as well as system administrators. |
Subordinate Threats and Categories | |
Identifier | Hacker |
Descriptive Name | Malicious unauthorized individual |
Description | A hacker is generally considered to be an external unauthorized user. More generally, any individual who attempts to gain unauthorized access may be regarded as a hacker. While a malicious insider may be covered under other categories such as Admin or User, it is also the case that malicious insiders are generally able to perform Hacker attacks. |
Editorial | |
Subordinate Threats and Categories | |
Identifier | Physical_Environment |
Descriptive Name | The physical environment is the threat agent |
Description | Natural Disasters and other entities that are not human or an IT device would fall into this category. This would include but not be limited to heat, cosmic rays, and other factors that might contribute to hardware aging. |
Editorial | |
Subordinate Threats and Categories | |
Identifier | Root |
Descriptive Name | Threats To Security |
Description | Accidents, misuse and abuse that degrade the quality of the TOE. |
Editorial | This category contains all other threat categories. |
Subordinate Threats and Categories | |
Identifier | System_Developer |
Descriptive Name | System/TOE Developer |
Description | The system developer is the organization or person responsible for the development of the target of evaluation (TOE). |
Editorial | Potentially, this includes not only designers, managers, implementers, and testers of the TOE, but potentially TOE evaluators, PP authors, as well. |
Subordinate Threats and Categories | |
Identifier | System_HW_SW |
Descriptive Name | System/Hardware/Software |
Description | This category describes threats that are tightly bound to flaws or faults in a system's hardware, firmware, or software. |
Editorial | IT devices have to be programmed or tasked to complete an action. However, an IT device acting responsibly and doing its prescribed job can propagate a threat (e.g. - a mail server transporting virus-infected email) and thus might be considered a colluding threat agent. |
Subordinate Threats and Categories | |
Identifier | User |
Descriptive Name | Authorized user |
Description | Authorized users are the threat source for each threat. |
Editorial | |
Subordinate Threats and Categories |