Ricoh Aficio MP 8001 sec - Page 34

MFP Control Software with the TOE users by O.GENUINE.

Page 34 highlights

later identify whether or not O.MEM.PROTECT was performed successfully. Therefore, the TOE can counter T.SALVAGE. Page 33 of 82 T.TRANSIT (Data interception and tampering with communication path) To counter this threat, the TOE protects document data and print data on communication path from leakage, and detects tampering. In addition, the performance of O.NET.PROTECT is recorded as audit logs by O.AUDIT, and the function to read audit logs is only provided to the machine administrator so that the machine administrator verifies afterwards whether or not O.NET.PROTECT was performed. Therefore, the TOE can counter T.TRANSIT. T.FAX_LINE (Intrusion via telephone line) To counter this threat, the TOE prevents the intrusion from a telephone line connected to Fax Unit to the TOE by O.LINE_PROTECT. In addition, the performance of O.LINE_PROTECT is recorded as audit logs by O.AUDIT, and the function to read audit logs is only provided to the machine administrator so that the machine administrator detects afterwards whether or not O.LINE_PROTECT was successfully performed. Therefore, the TOE can counter T.FAX_LINE. P.SOFTWARE (Checking software integrity) To enforce this organisational security policy, the TOE provides the function to verify the integrity of the MFP Control Software with the TOE users by O.GENUINE. Therefore, the TOE can enforce P.SOFTWARE. Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83

Page 33 of 82
Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.
later identify whether or not O.MEM.PROTECT was performed successfully.
Therefore, the TOE can counter T.SALVAGE.
T.TRANSIT
(Data interception and tampering with communication path)
To counter this threat, the TOE protects document data and print data on communication path from leakage,
and detects tampering. In addition, the performance of O.NET.PROTECT is recorded as audit logs by
O.AUDIT, and the function to read audit logs is only provided to the machine administrator so that the
machine administrator verifies afterwards whether or not O.NET.PROTECT was performed.
Therefore, the TOE can counter T.TRANSIT.
T.FAX_LINE
(Intrusion via telephone line)
To counter this threat, the TOE prevents the intrusion from a telephone line connected to Fax Unit to the
TOE by O.LINE_PROTECT. In addition, the performance of O.LINE_PROTECT is recorded as audit logs
by O.AUDIT, and the function to read audit logs is only provided to the machine administrator so that the
machine administrator detects afterwards whether or not O.LINE_PROTECT was successfully performed.
Therefore, the TOE can counter T.FAX_LINE.
P.SOFTWARE
(Checking software integrity)
To enforce this organisational security policy, the TOE provides the function to verify the integrity of the
MFP Control Software with the TOE users by O.GENUINE.
Therefore, the TOE can enforce P.SOFTWARE.