Security Target
Page 8
...it. Copyright (c) 2010 RICOH COMPANY, LTD. The TOE incorporates some of the assumed TOE environment. Audit Function 2. Stored Data Protection Function 5. Security M anagement Function 7. Users can also use these functions from a client computer via a network, USB connection, or fax. All .... Users can operate the TOE from the Operation Panel, a client computer connected to the local network, or a client computer connected to users' needs. Document Data Access Control Function 4. Network Communication Data Protection Function 6. Service Mode Lock Function 8. Paper documents are ...
...it. Copyright (c) 2010 RICOH COMPANY, LTD. The TOE incorporates some of the assumed TOE environment. Audit Function 2. Stored Data Protection Function 5. Security M anagement Function 7. Users can also use these functions from a client computer via a network, USB connection, or fax. All .... Users can operate the TOE from the Operation Panel, a client computer connected to the local network, or a client computer connected to users' needs. Document Data Access Control Function 4. Network Communication Data Protection Function 6. Service Mode Lock Function 8. Paper documents are ...
Security Target
Page 9
... downloaded and installed into the client computer from the website indicated in the FTP server. Copyright (c) 2010 RICOH COMPANY, LTD. Page 9 of 81 Office FTP server SMB server Firewall Internet (External network) SMTP server Internal network USB Connect Pr inter driver Fax d river Web b rowser MFP (TOE) Printer driver Fax dr iver Client computer...
... downloaded and installed into the client computer from the website indicated in the FTP server. Copyright (c) 2010 RICOH COMPANY, LTD. Page 9 of 81 Office FTP server SMB server Firewall Internet (External network) SMTP server Internal network USB Connect Pr inter driver Fax d river Web b rowser MFP (TOE) Printer driver Fax dr iver Client computer...
Security Target
Page 12
... basic arithmetic processing of fax communications and controls the fax communications according to an Ethernet (100BASE-TX/10BASE-T) network. When a CE performs Copyright (c) 2010 RICOH COMPANY, LTD. Page 12 of the TOE, and is normally covered. The following are descriptions of these ... in which the MFP Control Software is an interface board for identification and authentication are stored. Network Unit Network Unit is installed. [RAM] A volatile memory medium used to connect a client computer to a telephone line. The interface provides the MFP Control Software with the ...
... basic arithmetic processing of fax communications and controls the fax communications according to an Ethernet (100BASE-TX/10BASE-T) network. When a CE performs Copyright (c) 2010 RICOH COMPANY, LTD. Page 12 of the TOE, and is normally covered. The following are descriptions of these ... in which the MFP Control Software is an interface board for identification and authentication are stored. Network Unit Network Unit is installed. [RAM] A volatile memory medium used to connect a client computer to a telephone line. The interface provides the MFP Control Software with the ...
Security Target
Page 16
... have concurrent administrator roles, and administrator roles can be registered for the TOE as a factory setting. Managing the TOE's network connections. VM Card Manuals Page 16 of selecting the TOE administrators and TOE supervisor. Table 1: List of the default supervisor. ...administrators who is registered for the TOE. A default supervisor is registered on the TOE as a factory setting. Copyright (c) 2010 RICOH COMPANY, LTD. - When selecting administrators, the responsible manager assigns each administrator role. The person selected to be assigned to four ...
... have concurrent administrator roles, and administrator roles can be registered for the TOE as a factory setting. Managing the TOE's network connections. VM Card Manuals Page 16 of selecting the TOE administrators and TOE supervisor. Table 1: List of the default supervisor. ...administrators who is registered for the TOE. A default supervisor is registered on the TOE as a factory setting. Copyright (c) 2010 RICOH COMPANY, LTD. - When selecting administrators, the responsible manager assigns each administrator role. The person selected to be assigned to four ...
Security Target
Page 18
...and Print Function. Scanner Function This function is for printing and deleting fax data. Copyright (c) 2010 RICOH COMPANY, LTD. General users are accessed by e-mail via networks. printing multiple pages onto a single sheet). In addition, the scanned original images can be printed and... browser of copies, magnification, and custom settings (e.g. A client computer can use the Web Service Functions, depending on the network or directly connected to folders or sending them as document data. All Rights Reserved. Administrators and supervisors are available from the Operation Panel, ...
...and Print Function. Scanner Function This function is for printing and deleting fax data. Copyright (c) 2010 RICOH COMPANY, LTD. General users are accessed by e-mail via networks. printing multiple pages onto a single sheet). In addition, the scanned original images can be printed and... browser of copies, magnification, and custom settings (e.g. A client computer can use the Web Service Functions, depending on the network or directly connected to folders or sending them as document data. All Rights Reserved. Administrators and supervisors are available from the Operation Panel, ...
Security Target
Page 19
... 6. In addition, document data stored in the D-BOX using the Document Server Function. As for Management Functions, security-related functions are network-connected. Sending document data stored in "1.4.4.2 Security Functions". Downloading document data stored in the D-BOX as document data. Document data stored using ...Security Functions include the Audit Function, Identification and Authentication Function, Document Data Access Control Function, Stored Data Protection Function, Network Communication Data Protection Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.
... 6. In addition, document data stored in the D-BOX using the Document Server Function. As for Management Functions, security-related functions are network-connected. Sending document data stored in "1.4.4.2 Security Functions". Downloading document data stored in the D-BOX as document data. Document data stored using ...Security Functions include the Audit Function, Identification and Authentication Function, Document Data Access Control Function, Stored Data Protection Function, Network Communication Data Protection Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.
Security Target
Page 23
... data stored in the TOE or output by e-mail to a client computer (to "On". From the network or from a device connected to the USB Port Document data is created from print data received through the network or the USB Port that is then converted to a format that is created from the scanned image... server. 3. Downloaded by the following two methods: 1. The Service Mode Lock Function prevents the M aintenance Function being used by the following five methods: 1. Copyright (c) 2010 RICOH COMPANY, LTD.
... data stored in the TOE or output by e-mail to a client computer (to "On". From the network or from a device connected to the USB Port Document data is created from print data received through the network or the USB Port that is then converted to a format that is created from the scanned image... server. 3. Downloaded by the following two methods: 1. The Service Mode Lock Function prevents the M aintenance Function being used by the following five methods: 1. Copyright (c) 2010 RICOH COMPANY, LTD.
Security Target
Page 27
... described below are the assumptions related to the use and environment of MFP Control Software, which is connected to an external network such as the Internet, the internal network shall be protected from the external network. Copyright (c) 2010 RICOH COMPANY, LTD. P.SOFTWARE Page 27 of 81 (Software integrity checking) Measures shall be provided for verifying...
... described below are the assumptions related to the use and environment of MFP Control Software, which is connected to an external network such as the Internet, the internal network shall be protected from the external network. Copyright (c) 2010 RICOH COMPANY, LTD. P.SOFTWARE Page 27 of 81 (Software integrity checking) Measures shall be provided for verifying...
Security Target
Page 29
...select trusted persons as supervisors and instructs them with Table 3. Copyright (c) 2010 RICOH COMPANY, LTD. by security objectives. All Rights Reserved. The "v" in "3. OE.NETWORK (Network environment for TOE" or "4.2 Security Objectives of Operational Environment" with the compliance... Threats", "3.2 Organisational Security Policies" and "3.3 Assumptions", and either "4.1 Security Objectives for TOE connection) If the internal network, to which the TOE is connected, is satisfied by employing a firewall) 4.3 Security Objectives Rationale This section describes the rationale of...
...select trusted persons as supervisors and instructs them with Table 3. Copyright (c) 2010 RICOH COMPANY, LTD. by security objectives. All Rights Reserved. The "v" in "3. OE.NETWORK (Network environment for TOE" or "4.2 Security Objectives of Operational Environment" with the compliance... Threats", "3.2 Organisational Security Policies" and "3.3 Assumptions", and either "4.1 Security Objectives for TOE connection) If the internal network, to which the TOE is connected, is satisfied by employing a firewall) 4.3 Security Objectives Rationale This section describes the rationale of...
Security Target
Page 31
...addition, the performance of O.MEM.PROTECT is recorded in a device other than the TOE. Copyright (c) 2010 RICOH COMPANY, LTD. Page 31 of 81 A.NETWORK (Assumptions for reading audit logs is available to the machine administrator only, so that the machine administrator can...TSF data, and security attributes by A.NETWORK, when the network that the TOE is connected to (the internal network) is connected to an external network such as the Internet, the internal network shall be protected from unauthorised communications originating from the external network. In addition, O.I&A and O.MANAGE ...
...addition, the performance of O.MEM.PROTECT is recorded in a device other than the TOE. Copyright (c) 2010 RICOH COMPANY, LTD. Page 31 of 81 A.NETWORK (Assumptions for reading audit logs is available to the machine administrator only, so that the machine administrator can...TSF data, and security attributes by A.NETWORK, when the network that the TOE is connected to (the internal network) is connected to an external network such as the Internet, the internal network shall be protected from unauthorised communications originating from the external network. In addition, O.I&A and O.MANAGE ...
Security Target
Page 75
...FTP_TRP.1 (Trusted path) is satisfied. 7.1.8 SF.FAX_LINE Protection Function for Intrusion via Telephone Line When it . Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved. Users can send filesreferringto the registered folder information only. By the above, FTP_ITC.1 (Inter-...Network Communication Data Protection Function" and their corresponding security functional requirements. 7.1.7.1 Use of Web Service Function from Client Computer Whenever it receives a request from a client computer for use of each functional item in transit on an SMB or FTP server, the TOE connects...
...FTP_TRP.1 (Trusted path) is satisfied. 7.1.8 SF.FAX_LINE Protection Function for Intrusion via Telephone Line When it . Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved. Users can send filesreferringto the registered folder information only. By the above, FTP_ITC.1 (Inter-...Network Communication Data Protection Function" and their corresponding security functional requirements. 7.1.7.1 Use of Web Service Function from Client Computer Whenever it receives a request from a client computer for use of each functional item in transit on an SMB or FTP server, the TOE connects...
Security Target
Page 77
...-Fax MFP Responsible manager of the terms used and who has authority to assign MFP administrators and supervisors. (Or the person who is connected to the HDD installed in the TOE that can also send document files to a fax that encrypts data to be written on the ...Information about each general user that faxes document data from the HDD. Copyright (c) 2010 RICOH COMPANY, LTD. It can identify TOE components such as system/copy, network support, scanner, printer, fax, Web support, Web Uapl, and Network Doc Box. An abbreviation of an MFP. A function that is held. Refers to ...
...-Fax MFP Responsible manager of the terms used and who has authority to assign MFP administrators and supervisors. (Or the person who is connected to the HDD installed in the TOE that can also send document files to a fax that encrypts data to be written on the ...Information about each general user that faxes document data from the HDD. Copyright (c) 2010 RICOH COMPANY, LTD. It can identify TOE components such as system/copy, network support, scanner, printer, fax, Web support, Web Uapl, and Network Doc Box. An abbreviation of an MFP. A function that is held. Refers to ...
Security Target
Page 78
...role. Copyright (c) 2010 RICOH COMPANY, LTD. Terms SMTP server Address Book Back Up/Restore Address Book Internet Fax Customer engineer (CE) Fax reception process on Controller Board Supervisor Supervisor ID Supervisor authentication information Network administration Network control data Minimum Password ... A server for sending e-mail using Simple Mail Transfer Protocol. MFP control data for identification and authentication of the TOE's network connections. There are Level 1 and Level 2 Password Complexity Settings. A function that data at a later time. It receives information on...
...role. Copyright (c) 2010 RICOH COMPANY, LTD. Terms SMTP server Address Book Back Up/Restore Address Book Internet Fax Customer engineer (CE) Fax reception process on Controller Board Supervisor Supervisor ID Supervisor authentication information Network administration Network control data Minimum Password ... A server for sending e-mail using Simple Mail Transfer Protocol. MFP control data for identification and authentication of the TOE's network connections. There are Level 1 and Level 2 Password Complexity Settings. A function that data at a later time. It receives information on...