Ricoh Aficio MP C2800 Security Target - Page 31

Therefore, the TOE can counter T.FAX_LINE.

Page 31 highlights

Page 31 of 80 T.TRANSIT (Data interception and tampering with communication path) To counter this threat, the TOE protects document data and Print Data on communication path from leakage, and detects tampering. In addition, the performance of O.NET.PROTECT is recorded as audit logs by O.AUDIT, and the function to read audit logs is only provided to the machine administrator so that the machine administratorverifies afterwards whether or not O.NET.PROTECT was performed. Therefore, the TOE can counter T.TRANSIT. T.FAX_LINE (Intrusion via telephone line) To counter this threat, the TOE prevents the intrusion from a telephone line connected to Fax Unit to the TOE by O.LINE_PROTECT. In addition, the performance of O.LINE_PROTECT is recorded as audit logs by O.AUDIT, and the function to read audit logs is only provided to the machine administrator so that the machine administrator detects afterwards whether or not O.LINE_PROTECT was successfully performed. Therefore, the TOE can counter T.FAX_LINE. P.SOFTWARE (Checking software integrity) To enforce this organisational security policy, the TOE provides the function to verify the integrity of MFP Control Softwa re, which is installed in FlashROM, with the TOE users by O.GENUINE. Therefore, the TOE can enforce P.SOFTWARE. Copyright (c) 2009,2010 RICOH COMPANY, LTD. All Rights Reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80

Page 31 of 80
Copyright (c) 2009,2010 RICOH COMPANY, LTD. All Rights Reserved.
T.TRANSIT
(Data interception and tampering with communication path)
To counter this threat, the TOE protects document data and Print Data on communication path from leakage,
and detects tampering. In addition, the performance of O.NET.PROTECT is recorded as audit logs by
O.AUDIT, and the function to read audit logs is only provided to the machine administrator so that the
machine administratorverifies afterwards whether or not O.NET.PROTECT was performed.
Therefore, the TOE can counter T.TRANSIT.
T.FAX_LINE
(Intrusion via telephone line)
To counter this threat, the TOE prevents the intrusion from a telephone line connected to Fax Unit to the
TOE by O.LINE_PROTECT. In addition, the performance of O.LINE_PROTECT is recorded as audit logs
by O.AUDIT, and the function to read audit logs is only provided to the machine administrator so that the
machine administrator detects afterwards whether or not O.LINE_PROTECT was successfully performed.
Therefore, the TOE can counter T.FAX_LINE.
P.SOFTWARE
(Checking software integrity)
To enforce this organisational security policy, the TOE provides the function to verify the integrity of MFP
Control Software, which is installed in FlashROM, with the TOE users by O.GENUINE.
Therefore, the TOE can enforce P.SOFTWARE.