Illegal operation(Route is legitimate) |
End user's malicious operation |
Y |
Y |
Y |
Y |
|
Malicious operation by the administrator of customer assets management function |
Y |
Y |
Y |
Y |
|
Impersonation to end users |
Y |
Y |
Y |
Y |
|
Insider impersonating an administrator |
Y |
Y |
Y |
Y |
Intrusion from outside |
Intrusion into Tx signing function |
Y |
Y |
Y |
Y |
|
Intrusion into incoming coin management function |
Y |
Y |
Y |
Y |
|
Intrusion into customer asset management function |
Y |
Y |
Y |
Y |
|
Intrusion into custodian operation function |
Y |
Y |
Y |
Y |
Incorrect behavior is different from operation instruction |
Unintended behaviors of Tx signing function |
Y |
Y |
- |
- |
|
Unintended behaviors of incoming coin management function |
Y |
Y |
- |
- |
|
Unintended behaviors of customer asset management function |
Y |
Y |
- |
- |
|
Unintended behaviors of custodian operation function |
Y |
Y |
- |
- |
Human error |
Error in operation by end user |
Y |
Y |
- |
- |
|
Error in operation by administrator of customer asset management function |
Y |
Y |
- |
- |