Ricoh Aficio MP 2851 Security Target - Page 26

Security Problem Definitions

Page 26 highlights

Page 26 of 81 3 Security Problem Definitions This section provides details of threats, organisational security policies, and assumptions. 3.1 Threats Defined and described below are the assumed threats related to the use and environment of this TOE. The threats defined in this section are attacks by unauthorised persons with knowledge of published information about TOE operations and such attackers are capable of potential security attacks. T.ILLEGAL_USE (Abuse of TOE) Attackers may read or delete document data by gaining unauthorised access to the TOE through the device's interfaces (the Operation Panel, network interface, USB Port, or SD card interface). T.UNAUTH_ACCESS (Access violation to protected assets stored in TOE) Authorised TOE users may breach the limits of authorised usage and access document data through the external TOE interfaces (the Operation Panel, network interface, or USB Port) that are provided for them. T.ABUSE_SEC_MNG (Abuse of Security Management Function) Persons not authorised to use Security Management Functions may abuse them. T.SALVAGE (Salvaging memory) Attackers may remove the HDD from the TOE and disclose document data. T.TRANSIT (Interceptions and tampering on communication path) Attackers may illegally obtain, leak, or tamper with document data or print data sent or received by the TOE via the internal network. T.FAX_LINE (Intrusion from te lephone line) Attackers may gain access to the TOE through telephone lines. 3.2 Organisational Security Policies The following security policy is assumed for organisations that demand integrity of the software installed in its IT products. Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81

Page 26 of 81
Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.
3 Security Problem Definitions
This section provides details of threats, organisational security policies, and assumptions.
3.1
Threats
Defined and described below are the assumed threats related to the use and environment of this TOE. The
threats defined in this section are attacks by unauthorised persons with knowledge of published information
about TOE operations and such attackers are capable of potential security attacks.
T.ILLEGAL_USE
(Abuse of TOE)
Attackers may read or delete document data by gaining unauthorised access to the TOE
through the device's interfaces (the Operation Panel, network interface, USB Port, or SD
card interface).
T.UNAUTH_ACCESS
(Access violation to protected assets stored in TOE)
Authorised TOE users may breach the limits of authorised usage and access document
data through the external TOE interfaces (the Operation Panel, network interface, or
USB Port) that are provided for them.
T.ABUSE_SEC_MNG
(Abuse of Security Management Function)
Persons not authorised to use Security Management Functions may abuse them.
T.SALVAGE
(Salvaging memory)
Attackers may remove the HDD from the TOE and disclose document data.
T.TRANSIT
(Interceptions and tampering on communication path)
Attackers may illegally obtain, leak, or tamper with document data or print data sent or
received by the TOE via the internal network.
T.FAX_LINE
(Intrusion from te lephone line)
Attackers may gain access to the TOE through telephone lines.
3.2
Organisational Security Policies
The following security policy is assumed for organisations that demand integrity of the software installed in
its IT products.