Loading EN-304-626.md +3 −1 Original line number Diff line number Diff line Loading @@ -337,6 +337,8 @@ Operating systems include software products with digital elements that provide a This category includes but is not limited to real-time operating systems, general-purpose and special-purpose operating systems. > **NOTE: The remainder of section 4.3 is more of a collection of notes than an overview - not ready for review yet.** > FIXME write an operating systems overview and make some diagrams > FIXME include the relation graphic between verticals here to explain the outside relationship. Loading Loading @@ -597,7 +599,7 @@ Note: "account" refers to a user in the operating systems sense: a unique system * CONF-1: forseeable use allows operating system configuration changes only by skilled or trusted users, such as corporate IT support staff. * CONF-2: forseeable use of the operating system includes configuration changes by end-users. ### 4.5.1 Mapping of use cases to risk factors and security levels ### 4.5.1 Mapping of use cases to risk factors | Use Case | NUSR | CUSR | DATA | PHYS | LOSS | HWMD | SWMD | DVCS | TNET | FNET | CONF | _TOTAL_ | |----------|------|------|------|------|------|------|------|------|------|------|------|---------| Loading Loading
EN-304-626.md +3 −1 Original line number Diff line number Diff line Loading @@ -337,6 +337,8 @@ Operating systems include software products with digital elements that provide a This category includes but is not limited to real-time operating systems, general-purpose and special-purpose operating systems. > **NOTE: The remainder of section 4.3 is more of a collection of notes than an overview - not ready for review yet.** > FIXME write an operating systems overview and make some diagrams > FIXME include the relation graphic between verticals here to explain the outside relationship. Loading Loading @@ -597,7 +599,7 @@ Note: "account" refers to a user in the operating systems sense: a unique system * CONF-1: forseeable use allows operating system configuration changes only by skilled or trusted users, such as corporate IT support staff. * CONF-2: forseeable use of the operating system includes configuration changes by end-users. ### 4.5.1 Mapping of use cases to risk factors and security levels ### 4.5.1 Mapping of use cases to risk factors | Use Case | NUSR | CUSR | DATA | PHYS | LOSS | HWMD | SWMD | DVCS | TNET | FNET | CONF | _TOTAL_ | |----------|------|------|------|------|------|------|------|------|------|------|------|---------| Loading