[Zope3-checkins] CVS: Zope3/doc/security - SecurityTarget.txt:1.11

Scott Pascoe manager at planneditsolutions.com
Thu May 6 11:06:17 EDT 2004


Update of /cvs-repository/Zope3/doc/security
In directory cvs.zope.org:/tmp/cvs-serv25984/doc/security

Modified Files:
	SecurityTarget.txt 
Log Message:
read through, correcting spelling, typos


=== Zope3/doc/security/SecurityTarget.txt 1.10 => 1.11 ===
--- Zope3/doc/security/SecurityTarget.txt:1.10	Thu May  6 10:39:12 2004
+++ Zope3/doc/security/SecurityTarget.txt	Thu May  6 11:06:16 2004
@@ -198,7 +198,7 @@
 
 Until agreed to be ready for public test the development and until all features
 are available (but maybe untested), development of a feature release happens
-onthe CVS HEAD branch. WHen starting public releases, no further features are
+on the CVS HEAD branch. When starting public releases, no further features are
 allowed to be introduced and the development enters maintanence mode. Therefore
 a named branch is created to identify changes that are applied for maintenance.
 New features will be introduced on the HEAD branch that is heading for the next
@@ -223,7 +223,7 @@
 TOE Logical Boundaries
 ^^^^^^^^^^^^^^^^^^^^^^
 
-The logical boundary fopr the TOE consists of the four security
+The logical boundary for the TOE consists of the four security
 sub-systems of Zope:
 
 - permission declarations
@@ -282,7 +282,7 @@
 or more users with the system.  An interaction keeps track of the
 users that are participating in the interaction as "participations".
 In the TOE, interactions will have single users participating through
-server request (for example, Web requests).  Interactions are refered
+server request (for example, Web requests).  Interactions are referred
 to as "subjects" in the TOE.
 
 Operations
@@ -308,7 +308,7 @@
     Assumption Name     Description
     ===============     ==================================================
     A.OS                The machine and the operating system Zope is 
-                        running on is physical secure. 
+                        running on is physically secure. 
     A.Admin             The "system-administrator" of the above 
                         mentioned machine is trustworthy.
     A.Network           A network connection to the Zope services is 
@@ -333,7 +333,7 @@
 
     *   Users having correct authentication credentials who might try to
         acquire more permission or role grants to get access to operations they
-        shall not.
+        should not.
         
     *   Users without correct authentication credentials for a certain
         principal trying to authenticate as this.
@@ -355,7 +355,7 @@
                        generation functions to log false information 
                        (date, time, type of event, outcome, user)
     T.Import           An attacker might try to make the system
-                       interprete imported security attributes in a
+                       interpret imported security attributes in a
                        not intended way to acquire a higher level of 
                        access to the system.
     T.RIP              An attacker might try to make the system use
@@ -452,7 +452,7 @@
     O.ManageRisk    Provide the ability to manage risk by trading off
                     functionality against risk. For example, we can
                     make it easier to access the system to perform 
-                    operations whos potentional negative impact is
+                    operations whose potential negative impact is
                     low, but make it more difficult to access the
                     system in a way that allows operations with high
                     negative impact.
@@ -470,7 +470,7 @@
     Assumption Name     Description
     ===============     =======================================================
     OE.OS               The machine and the operating system Zope is running 
-                        on is physical secure.
+                        on is physically secure.
     OE.Trust            Those responsible for the TOE must be trustworthy.
     OE.Manage           Those responsible for the TOE must ensure that the TOE 
                         is delivered, installed, managed, and operated in a 
@@ -510,7 +510,7 @@
 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
 
 The following functional requirements identify the TOE functional requirements.
-They have beend drawn from the CC Part 2 functional requirements components.
+They have been drawn from the CC Part 2 functional requirements components.
 
 Class FAU: Audit data generation
 ********************************
@@ -869,7 +869,7 @@
 
     The TSF shall enforce the *[formal security policy]* to restrict
     the ability to *[selection: modify]* the security attributes
-    *[password]* to *[authorised administrators, users authorized to
+    *[password]* to *[authorized administrators, users authorized to
     modify their own authentication data]*.
 
 
@@ -909,7 +909,7 @@
 
     authorized administrator
        Users who can perform system-wide security functions. These are
-       people who have the zope.ManageSercurity permission.       
+       people who have the zope.ManageSecurity permission.       
 
     Grantor 
        Users who have the ability to grant or deny permissions to




More information about the Zope3-Checkins mailing list