Ricoh Aficio MP C3001 Security Target - Page 37

Security Problem Definitions

Page 37 highlights

Page 36 of 93 3 Security Problem Definitions This section describes Threats, Organisational Security Policies and Assumptions. 3.1 Threats Defined and described below are the assumed threats related to the use and environment of this TOE. The threats defined in this section are unauthorised persons with knowledge of published information about the TOE operations and such attackers are capable of Basic attack potential. T.DOC.DIS Document disclosure Documents under the TOE management may be disclosed to persons without a login user name, or to persons with a login user name but without an access permission to the document. T.DOC.ALT Document alteration Documents under the TOE management may be altered by persons without a login user name, or by persons with a login user name but without an access permission to the document. T.FUNC.ALT User job alteration User jobs under the TOE management may be altered by persons without a login user name, or by persons with a login user name but without an access permission to the user job. T.PROT.ALT Alteration of TSF protected data TSF Protected Data under the TOE management may be altered by persons without a login user name, or by persons with a login user name but without an access permission to the TSF Protected Data. T.CONF.DIS Disclosure of TSF confidential data TSF Confidential Data under the TOE management may be disclosed to persons without a login user name, or to persons with a login user name but without an access permission to the TSF Confidential Data. T.CONF.ALT Alteration of TSF confidential data TSF Confidential Data under the TOE management may be altered by persons without a login user name, or by persons with a login user name but without an access permission to the TSF Confidential Data. Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94

Page 36 of
93
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.
3 Security Problem Definitions
This section describes Threats, Organisational Security Policies and Assumptions.
3.1
Threats
Defined and described below are the assumed threats related to the use and environment of this TOE. The
threats defined in this section are unauthorised persons with knowledge of published information about the
TOE operations and such attackers are capable of Basic attack potential.
T.DOC.DIS
Document disclosure
Documents under the TOE management may be disclosed to persons without a login
user name, or to persons with a login user name but without an access permission to the
document.
T.DOC.ALT
Document alteration
Documents under the TOE management may be altered by persons without a login user
name, or by persons with a login user name but without an access permission to the
document.
T.FUNC.ALT
User job alteration
User jobs under the TOE management may be altered by persons without a login user
name, or by persons with a login user name but without an access permission to the user
job.
T.PROT.ALT
Alteration of TSF protected data
TSF Protected Data under the TOE management may be altered by persons without a
login user name, or by persons with a login user name but without an access permission
to the TSF Protected Data.
T.CONF.DIS
Disclosure of TSF confidential data
TSF Confidential Data under the TOE management may be disclosed to persons without
a login user name, or to persons with a login user name but without an access
permission to the TSF Confidential Data.
T.CONF.ALT
Alteration of TSF confidential data
TSF Confidential Data under the TOE management may be altered by persons without a
login user name, or by persons with a login user name but without an access permission
to the TSF Confidential Data.