Security Target
Page 11
The Scanner Engine is an input device to direct instructions from the MFP Control Software. Copyright (c) 2010 RICOH COMPANY, LTD. It features key switches, LED indicators, an LCD touch screen, and the Operation Panel Control Board. Page 11 of 81 User Document Output ... printing and outputting of the Scanner Engine and Printer Engine to the MFP Control Software, and operates the Scanner Engine or Printer Engine according to instructions from the key switches and LCD touch screen to the MFP Control Software, or in response to read the paper documents. The Engine Control Software...
The Scanner Engine is an input device to direct instructions from the MFP Control Software. Copyright (c) 2010 RICOH COMPANY, LTD. It features key switches, LED indicators, an LCD touch screen, and the Operation Panel Control Board. Page 11 of 81 User Document Output ... printing and outputting of the Scanner Engine and Printer Engine to the MFP Control Software, and operates the Scanner Engine or Printer Engine according to instructions from the key switches and LCD touch screen to the MFP Control Software, or in response to read the paper documents. The Engine Control Software...
Security Target
Page 12
... is located on the HDD and decrypts information to the HDD. The following are stored. When a CE performs Copyright (c) 2010 RICOH COMPANY, LTD. It is used to connect a client computer to instructions from the client computer. Ic Hdd A security chip that generates random numbers and encryption keys, and detects any tampering with...
... is located on the HDD and decrypts information to the HDD. The following are stored. When a CE performs Copyright (c) 2010 RICOH COMPANY, LTD. It is used to connect a client computer to instructions from the client computer. Ic Hdd A security chip that generates random numbers and encryption keys, and detects any tampering with...
Security Target
Page 13
...-1] - 9228/9233 MP 2851/3351 LD528/LD533 Aficio MP 2851/3351 Operating Instructions About This Machine - 9228/9233 MP 2851/3351 LD528/LD533 Aficio MP 2851/3351 Operating Instructions Troubleshooting - App2Me Start Guide - VM Card Manuals Copyright (c) 2010 RICOH COMPANY, LTD. Notes for Administrators 9228/9233 MP 2851/3351 LD528/LD533 Aficio MP 2851/3351 - Manuals for Administrators Security Reference Supplement 9228/9233 MP 2851/3351 LD528/LD533 Aficio MP 2851/3351 - Manuals...
...-1] - 9228/9233 MP 2851/3351 LD528/LD533 Aficio MP 2851/3351 Operating Instructions About This Machine - 9228/9233 MP 2851/3351 LD528/LD533 Aficio MP 2851/3351 Operating Instructions Troubleshooting - App2Me Start Guide - VM Card Manuals Copyright (c) 2010 RICOH COMPANY, LTD. Notes for Administrators 9228/9233 MP 2851/3351 LD528/LD533 Aficio MP 2851/3351 - Manuals for Administrators Security Reference Supplement 9228/9233 MP 2851/3351 LD528/LD533 Aficio MP 2851/3351 - Manuals...
Security Target
Page 15
... - MP 2851/MP 3351 MP 2851/MP 3351 Aficio MP 2851/3351 Operating Instructions About This Machine - Notes for Users MP 2851/3351 Aficio MP 2851/3351 - Quick Reference Printer Guide - Manuals for Users - Quick Reference Copy Guide - Quick Reference FAX Guide - Page 15 of 81 Manuals for Administrators MP 2851/3351 Aficio MP 2851/3351 - Manuals for Administrators Security Reference Supplement 9228/9233 MP 2851/3351 LD528/LD533 Aficio MP 2851/3351 Copyright (c) 2010 RICOH...
... - MP 2851/MP 3351 MP 2851/MP 3351 Aficio MP 2851/3351 Operating Instructions About This Machine - Notes for Users MP 2851/3351 Aficio MP 2851/3351 - Quick Reference Printer Guide - Manuals for Users - Quick Reference Copy Guide - Quick Reference FAX Guide - Page 15 of 81 Manuals for Administrators MP 2851/3351 Aficio MP 2851/3351 - Manuals for Administrators Security Reference Supplement 9228/9233 MP 2851/3351 LD528/LD533 Aficio MP 2851/3351 Copyright (c) 2010 RICOH...
Security Target
Page 27
... Control Software, which is connected to an external network such as the Internet, the internal network shall be protected from the external network. Copyright (c) 2010 RICOH COMPANY, LTD. Additionally, administrators shall not abuse their permissions maliciously. A.SUPERVISOR (Assumption for supervisor) Supervisors shall have sufficient knowledge to operate the TOE securely ...for network connections) When the network that the TOE is connected to (the internal network) is installed in the roles assigned to them and will instruct general users to operate the TOE securely also.
... Control Software, which is connected to an external network such as the Internet, the internal network shall be protected from the external network. Copyright (c) 2010 RICOH COMPANY, LTD. Additionally, administrators shall not abuse their permissions maliciously. A.SUPERVISOR (Assumption for supervisor) Supervisors shall have sufficient knowledge to operate the TOE securely ...for network connections) When the network that the TOE is connected to (the internal network) is installed in the roles assigned to them and will instruct general users to operate the TOE securely also.
Security Target
Page 29
... are solved: all assumptions upheld. 4.3.1 Tracing This section describes the correspondence between the external and internal networks (e.g. by security objectives. Once instructed, administrators then shall instruct general users, familiarising them with Table 3. Table 3 demonstrates that each security objective corresponds to at least one threat, organisational security policy, ... between the previously described "3.1 Threats", "3.2 Organisational Security Policies" and "3.3 Assumptions", and either "4.1 Security Objectives for the TOE. Copyright (c) 2010 RICOH COMPANY, LTD.
... are solved: all assumptions upheld. 4.3.1 Tracing This section describes the correspondence between the external and internal networks (e.g. by security objectives. Once instructed, administrators then shall instruct general users, familiarising them with Table 3. Table 3 demonstrates that each security objective corresponds to at least one threat, organisational security policy, ... between the previously described "3.1 Threats", "3.2 Organisational Security Policies" and "3.3 Assumptions", and either "4.1 Security Objectives for the TOE. Copyright (c) 2010 RICOH COMPANY, LTD.
Security Target
Page 30
...is upheld. As specified by OE.SUPERVISOR, the responsible manager of the MFP shall select trusted persons as administrators and instruct them , and be unlikely to abuse their permissions. All Rights Reserved. Page 30 of 81 Table 3: Relationship between... v v v v v 4.3.2 Tracing Justification The following are unlikely to abuse their permissions. Copyright (c) 2010 RICOH COMPANY, LTD. As specified by OE.ADMIN, the responsible manager of the MFP shall select trusted persons as supervisors and instruct them and instruct general users to operate the TOE securely also.
...is upheld. As specified by OE.SUPERVISOR, the responsible manager of the MFP shall select trusted persons as administrators and instruct them , and be unlikely to abuse their permissions. All Rights Reserved. Page 30 of 81 Table 3: Relationship between... v v v v v 4.3.2 Tracing Justification The following are unlikely to abuse their permissions. Copyright (c) 2010 RICOH COMPANY, LTD. As specified by OE.ADMIN, the responsible manager of the MFP shall select trusted persons as supervisors and instruct them and instruct general users to operate the TOE securely also.
Security Target
Page 74
...-AIS31 standard). The printed encryption keys are explanations of each functional item in Table 33. When the machine administrator uses the Operation Panel to instruct the TOE to or reads from the HDD, it from the Operation Panel, and allows all data written to print the HDD encryption keys.... on the HDD. Following are used to view the value of TSF data) is encrypted and decrypted by the machine administrator. Copyright (c) 2010 RICOH COMPANY, LTD. The TOE decrypts data with the Ic Hdd before writing it will show that the administrator can use to and read from HDD...
...-AIS31 standard). The printed encryption keys are explanations of each functional item in Table 33. When the machine administrator uses the Operation Panel to instruct the TOE to or reads from the HDD, it from the Operation Panel, and allows all data written to print the HDD encryption keys.... on the HDD. Following are used to view the value of TSF data) is encrypted and decrypted by the machine administrator. Copyright (c) 2010 RICOH COMPANY, LTD. The TOE decrypts data with the Ic Hdd before writing it will show that the administrator can use to and read from HDD...
Security Target
Page 78
...that sends e-mail with attached document data from backups made on the Controller Board with network management responsibility. Copyright (c) 2010 RICOH COMPANY, LTD. A function for identification and authentication of the supervisor. A password for connecting MFP to SD cards and ... Level 2 requires passwords to include a combination of more than two types of fax communications, and controls fax communications according to instructions from the TOE to folders on the Controller Board. A function that data at a later time. An administrator role assigning responsibility ...
...that sends e-mail with attached document data from backups made on the Controller Board with network management responsibility. Copyright (c) 2010 RICOH COMPANY, LTD. A function for identification and authentication of the supervisor. A password for connecting MFP to SD cards and ... Level 2 requires passwords to include a combination of more than two types of fax communications, and controls fax communications according to instructions from the TOE to folders on the Controller Board. A function that data at a later time. An administrator role assigning responsibility ...