Minolta bizhub C300 Specifications Page 4

  • Download
  • Add to my manuals
  • Print
  • Page
    / 110
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 3
bizhub C352 / bizhub C300 / ineo
+
351 / ineo
+
300
Control Software, Security Target
Copyright © 2006 KONICA MINOLTA BUSINESS TECHNOLOGIES, INC., All Rights Reserved.
4 / 110
6.1.9. F.HDD
HDD verification function
.............................................................................................................. 3
6.1.10. F.RESET
Authentication Failure Frequency Reset Function
.................................................................... 3
6.2. TOE Security Strength of Function.................................................................................................. 3
6.3. Correspondence between TOE Security Functions and Function Requirements.......................... 3
6.4. Assurance Measures....................................................................................................................... 3
7. PP Claims ...............................................................................................................................3
8. Rational...................................................................................................................................3
8.1. Security Objectives Rationale ......................................................................................................... 3
8.1.1. Necessity................................................................................................................................................... 3
8.1.2. Sufficiency of Assumptions......................................................................................................................... 3
8.1.3. Sufficiency of Threats................................................................................................................................. 3
8.1.4. Sufficiency of Organizational Security Policies............................................................................................ 3
8.2. IT Security Requirements Rationale ............................................................................................... 3
8.2.1. Rationale for IT Security Functional Requirements...................................................................................... 3
8.2.2. Rational for Minimum Strength of Function ................................................................................................. 3
8.2.3. Rationale for IT Security Assurance Requirements...................................................................................... 3
8.2.4. Consistency rationale for the set of IT security functional requirement......................................................... 3
8.3. Rational for TOE Summary Specifications...................................................................................... 3
8.3.1. Rational for the TOE Security Functions..................................................................................................... 3
8.3.2. Rational for TOE Security Strength of Function........................................................................................... 3
8.3.3. Mutually Supported TOE Security Functions............................................................................................... 3
8.3.4. Rationale for Assurance Measures............................................................................................................. 3
8.4. PP calims rationale.......................................................................................................................... 3
―【 List of Figures 】――――――――――――――――――――――――――――
Figure 1 An example of the expected environment for usage of the MFP....................................... 3
Figure 2 Hardware composition that relates to TOE......................................................................... 3
―【 List of Tables 】―――――――――――――――――――――――――――――
Table 1 Box Access Control Operational List.................................................................................... 3
Table 2 Secure Print File Access Control Operational List.............................................................. 3
Table 3 Setting Management Access Control Operational List ....................................................... 3
Table 4 TOE Security Assurance Requirements ................................................................................ 3
Table 5 List of security function name and identifier of TOE.............................................................. 3
Table 6 Character and number of digits used for password............................................................... 3
Table 7 A type of overwrite deletion of all domains and a method of overwrite................................. 3
Table 8 Correspondence between TOE Assurance Requirements and assurance measures ......... 3
Table 9 Conformity of Security Objectives to assumptions and Threats ........................................... 3
Table 10 Conformity of IT Security Functional Requiremetns to Security Objectives ....................... 3
Table 11 Dependencies of IT Security Functional Requirements Components................................. 3
Table 12 Mutual Support Correlations of IT Security Functional Requirements................................ 3
Table 13 Conformity of TOE Security Functions to TOE Security Functional Requirements............ 3
Page view 3
1 2 3 4 5 6 7 8 9 ... 109 110

Comments to this Manuals

No comments