Xerox Multi-Function Device Security Target23Copyright 2013 Xerox Corporation. All rights reserved.3.3. Threats3.3.1. Threats Addressed by the TOEThis security problem definition addresses threats posed by four categories ofthreat agents:1. Persons who are not permitted to use the TOE who may attempt touse the TOE2. Persons who are authorized to use the TOE who may attempt to useTOE functions for which they are not authorized.3. Persons who are authorized to use the TOE who may attempt toaccess data in ways for which they not authorized.4. Persons who unintentionally cause a software malfunction that mayexpose the TOE to unanticipated threats.The threats and policies defined in this ST address the threats posed bythese threat agents. This section describes threats to assets described insection 3.1.2.Table 13: Threats to user dataThreat Affected Asset DescriptionT.DOC.DIS D.DOC User Document Data may be disclosed tounauthorized personsT.DOC.ALT D.DOC User Document Data may be altered by unauthorizedpersonsT.FUNC.ALT D.FUNC User Function Data may be altered by unauthorizedpersonsTable 14: Threats to TSF dataThreat Affected Asset DescriptionT.PROT.ALT D.PROT TSF Protected Data may be altered by unauthorizedpersonsT.CONF.DIS D.CONF TSF Confidential Data may be disclosed tounauthorized personsT.CONF.ALT D.CONF TSF Confidential Data may be altered byunauthorized persons3.3.2. Threats Addressed by the IT EnvironmentThere are no threats addressed by the IT Environment.