Digital Data Communications LEVEL ONE FCS-4300 Guía de usuario Pagina 44

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 57
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 43
Fuji Xerox ApeosPort-II C4300(AP)Series Security Kit for Asia Pacific Security Target V1.01
- 40 -
8. Rationale
8.1. Security Objectives Rationale
Correspondences between security objectives and threats/assumptions are described in Table 13.
(1) Necessity
Rationale for the necessity of security objectives is described below.
As described in Table 13, all the security objectives correspond to one or more
threats/assumptions.
Table 13: Correspondences between Security Objectives and Threats/Assumptions
Threat/assumption
Security objective
T.RECOVER
T.CONFDATA
A.SECMODE
A.NET
A.ADMIN
O.RESIDUAL
O
O.DECIPHER
O
O.MANAGE
O
OE.ADMIN
O
OE.AUTH
O
OE.FUNCON
O
OE.NET
O
O: Shows that it is the threat or assumption that the security objective corresponds to.
(2) Sufficiency
The following describes the rationales that show that the sufficient measures against all the threats
to TOE and those for all the assumptions are taken.
As described in Table 13, one or more security objectives correspond to a threat. Threat can be
countered when the corresponding security objective is satisfied.
As described in Table 13, one of the security objectives corresponds to an assumption. Assumption
is assured when the corresponding security objective is satisfied.
Table 14 describes the rationales that show that the measures against threats to TOE and those for
assumptions are taken by satisfying the security objectives.
Table 14: Sufficiency of Security Objectives
Threat/
assumption
Security objective
T.RECOVER
To counter this threat, all of the following need to be satisfied:
- TOE security functions are enabled.
- TOE security functions are operated so that they are completely performed.
- Recovery of used document data stored on the hard disk drive is made impossible.
By satisfying the following objectives,
T.RECOVER can be countered:
-
O.RESIDUAL and O.DECIPHER
By satisfying
O.RESIDUAL and O.DECIPHER, TOE makes the recovery of used
document data stored on the hard disk drive impossible.
Vista de pagina 43
1 2 ... 39 40 41 42 43 44 45 46 47 48 49 ... 56 57

Comentarios a estos manuales

Sin comentarios