Ricoh Mp 3351 User Guide
Here you can view all the pages of manual Ricoh Mp 3351 User Guide. The Ricoh manuals for All in One Printer are available online for free. You can easily download all the documents as PDF.
Page 21
Page 21 of 81 Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved. permission, and changing the Print Settings is also permitted. Table 2 shows the relationship between the operation authorised by the permissions to process document data and the operations possible on the document data. Table 2: Correspondence between operations authorised by permissions to process document data and operations possible on document data Operations possible on document data Operation permissions...
Page 22
Page 22 of 81 Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved. Security Management Function This function allows administrators, supervisors, and general users who have been successfully authenticated by the previously described Identification and Authentication Function to perform the following operations for security management according to user role. 1. Management of document data ACL Allows only specified users to modify the document Data ACL. Modifying the document data ACL...
Page 23
Page 23 of 81 Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved. Service Mode Lock Function The Maintenance Function is used by CEs who receive a request from the machine administrator to perform maintenance on the TOE from the Operation Panel. The Service Mode Lock Function prevents the Maintenance Function being used. In this evaluation, the Service Mode Lock Function set to On. Telephone Line Intrusion Protection Function This function is for devices equipped with a Fax Unit. It...
Page 24
Page 24 of 81 Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved. 5. Sent as a fax. When output using methods 1 to 3, document data is protected from leakage, and tampered data can be detected. 1.4.5.2 Print Data Print data is data in which a print or fax image is written. It is generated from the document files in a client computer by the printer or fax drivers installed on the client computer when it is printed or faxed, respectively. Print data is imported to the TOE via the internal...
Page 25
Page 25 of 81 Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved. 2 Conformance Claims This section describes the conformance claim. 2.1 CC conformance Claim The CC conformance claim of this ST and TOE is as follows: - CC version for which this ST claims conformance Part 1: Introduction and general model September 2006 Version 3.1 Revision 1 (Japanese translation ver.1.2) CCMB-2006-09-002 Part 2: Security functional components September 2007 Version 3.1 Revision 2 (Japanese...
Page 26
Page 26 of 81 Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved. 3 Security Problem Definitions This section provides details of threats, organisational security policies, and assumptions. 3.1 Threats Defined and described below are the assumed threats related to the use and environment of this TOE. The threats defined in this section are attacks by unauthorised persons with knowledge of published information about TOE operations and such attackers are capable of potential security...
Page 27
Page 27 of 81 Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved. P.SOFTWARE (Software integrity checking) Measures shall be provided for verifying the integrity of MFP Control Software, which is installed in the FlashROM of the TOE. 3.3 Assumptions Defined and described below are the assumptions related to the use and environment of this TOE: A.ADMIN (Assumption for administrators) Administrators shall have sufficient knowledge to operate the TOE securely in the roles assigned to...
Page 28
Page 28 of 81 Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved. 4 Security Objectives This section describes the security objectives of the TOE and its security objectives of the operational environment and their rationale. 4.1 Security Objectives for TOE The following define the security objectives of the TOE. O.AUDIT (Audit) The TOE shall record Security Function-related events in an audit log, and provides the machine administrator with a function for reading the audit logs,...
Page 29
Page 29 of 81 Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved. O.LINE_PROTECT (Prevention of intrusion from telephone line) The TOE shall prevent unauthorised access to the TOE from a telephone line connected to the Fax Unit. 4.2 Security Objectives of Operational Environment The following describes the security objectives of the operational environment. OE.ADMIN (Trusted administrators) The responsible manager of the MFP shall select trusted persons as administrators and...
Page 30
Page 30 of 81 Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved. Table 3: Relationship between security environment and security objectives TOE security Environment Security objectives A.ADMIN A.SUPERVISOR A.NETWORK T.ILLEGAL_USE T.UNAUTH_ACCESS T.ABUSE_SEC_MNG T.SALVAGE T.TRANSIT T.FAX_LINE P.SOFTWARE O.AUDIT v v v v v O.I&A v v v O.DOC_ACC v O.MANAGE v O.MEM.PROTECT v O.NET.PROTECT v O.GENUINE v O.LINE_PROTECT...