600.436 High-Assurance Systems
Fall 01/Protection Profiles
7
¨Justify suitability of objectives for each threat, e.g.
–T2   An attacker on the hostile network may exploit inappropriate use of service protocols
–O2 and O3 limit the hosts and service ports that can be accessed from, respectively, the hostile and private networks.  O6 monitors possible attacks, providing the firewall administrator with the means of detecting them and hence taking appropriate action.