Digital Data Communications LEVEL ONE FCS-4300 Guía de usuario Pagina 26

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 57
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 25
Fuji Xerox ApeosPort-II C4300(AP)Series Security Kit for Asia Pacific Security Target V1.01
- 22 -
4. Security Objectives
4.1. Security Objectives for the TOE
Security objectives for the TOE are described in Table 7.
Table 7: Security Objectives for the TOE
4.2. Security Objectives for the Environment
4.2.1.
Security Objectives for IT Environment
There is no security objective for IT environment.
4.2.2. Security Objectives for Operation and Management
Security objectives for operation and management are described in Table 8.
Table 8: Security Objectives for Operation and Management
Objective Description
OE.AUTH
Key operator must manage “key-operator’s password” to prevent it from being guessed or
disclosed. Specifically, he or she must not set the key-operator’s password to the
alphanumeric characters that can be easily guessed nor store the data in the area where
attacker can see it.
Also, key operator must operate TOE, satisfying the following:
- “Key-operator’s password” is set to 7 to 12 alphanumeric characters.
- “Access denial due to failure in authentication of key-operators ID” is set to five times in
the condition where “customer-engineer operation restriction function” and “setting for
using password” are set to function.
OE.FUNCON
Key operator must operate TOE in the condition where “HDD overwriting function for
residual data” and “HDD data encryption function” are set to function.
OE.ADMIN
To assure that key operator has knowledge necessary to fulfill the assigned role and does
not conduct with malicious intention, organization person in charge must select suitable
member and provide management and education.
OE.NET
MFP that TOE is installed on is connected to an internal network. On this internal network,
organization person in charge installs the devices that realize the environment where
interceptions are not made, and performs the proper management and operation to prevent
interceptions.
Organization person in charge installs the devices to shut down the access to this internal
network from the external network, and properly makes settings to shut down the access.
Objective Description
O.RESIDUAL
TOE must make the recovery of used document data stored on the hard disk drive
impossible by overwriting.
O.DECIPHER
TOE must make the parsing of used document data stored on the hard disk drive difficult
by encryption.
O.MANAGE
TOE must enable only the authenticated key-operator to change TOE setting data.
Vista de pagina 25
1 2 ... 21 22 23 24 25 26 27 28 29 30 31 ... 56 57

Comentarios a estos manuales

Sin comentarios