Specifications

Security Target Version 1.0 9/29/2014
18
T.UNDETECTED_ACTIONS
Malicious remote users or external IT entities may take actions that adversely affect the
security of the TOE. These actions may remain undetected and thus their effects cannot be
effectively mitigated.
T.USER_DATA_REUSE
User data may be inadvertently sent to a destination not intended by the original sender.
3.3 Assumptions
A.NO_GENERAL_PURPOSE
It is assumed that there are no general-purpose computing capabilities (e.g., compilers or user
applications) available to the TOE, other than those services necessary for the operation,
administration and support of the TOE.
A.NO_TOE_BYPASS
Information cannot flow between the wireless client and the internal wired network without
passing through the TOE.
A.PHYSICAL
Physical security, commensurate with the value of the TOE and the data it contains, is
assumed to be provided by the environment.
A.TRUSTED_ADMIN
TOE Administrators are trusted to follow and apply all administrator guidance in a trusted
manner.