Ricoh LD533CG Instrucciones de operaciones Pagina 7

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 47
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 6
CRP-C0266-01
2
Functions from unauthorised persons by limiting the usage of the Security Management
Functions.
For these security functionalities, the evaluation for the validity of the design policy and the
correctness of the implementation is conducted in the scope of the assurance package. The
next clause describes the assumed threats and assumptions in this TOE.
1.1.2.1 Threats and Security Objectives
This TOE counters threats with the following Security Functions:
In order to protect the document data as protected assets from viewing and tampering by a
third party who is not permitted to use the TOE, the TOE performs user identification and
authentication for the TOE users and the TOE also restricts access to the document data and
available functions according to user roles. This function enables only users who have been
identified, authenticated, and permitted to access the functions of the TOE and the stored
document data in the TOE.
When permitted users store document data via internal networks into the TOE, in order to
ensure the confidentiality and completeness of the document data during data
communications, the device contains functions to encrypt the data between the connected
computers and the TOE, and to decrypt the data on client computers and the TOE for
communication on the internal network. This enables protection of document data from
leakage and tampering by eavesdropping on the internal network from a third party.
As for setting of the Security Functions mentioned above, in order to prevent users without
permission to set the functions from changing and stopping the functions, the TOE confirms
the user identification of supervisor and administrators and limits to the minimum necessary
the Security Functions that can be operated by the supervisor and administrators to avoid
the risk of stopping the Security Functions by misuse of privileges.
1.1.2.2 Configuration and Assumptions
The evaluated product is assumed to be operated under the following configuration and
assumptions.
This TOE is assumed to be used in the environments which handle the office documents in
general offices. Also, the TOE is used through operation panel of the TOE, and through
printer drivers and Web browsers of client computers which are connected via internal
networks and telephone lines, and USB.
Internal networks use IPv4. Server computers such as FTP server, SMB server, and SMTP
server and client computers are connected to the internal networks. If connecting the TOE
to the internal networks which are connected to the external networks such as Internet,
not to attack in the TOE from the external networks through network, install firewalls in
the boundaries of the external networks and internal networks and protect the internal
networks and the TOE.
Administrators of this TOE have sufficient knowledge to securely operate the TOE and
they securely keep the TOE and the operational environment for the TOE. The
administrators shall not perform the illegal acts to abuse their own privileges, leak or
tamper the document data as protected assets, and to deactivate the Security Functions of
the TOE. Also, for general users who use the MFP, provide the necessary advice and
attentions to securely operate the TOE.
Supervisor and Customer Engineers have sufficient knowledge to securely operate the TOE.
Vista de pagina 6
1 2 3 4 5 6 7 8 9 10 11 12 ... 46 47

Comentarios a estos manuales

Sin comentarios