Home > Ricoh > All in One Printer > Ricoh Mp C3001 Instruction Manual

Ricoh Mp C3001 Instruction Manual

Here you can view all the pages of manual Ricoh Mp C3001 Instruction Manual. The Ricoh manuals for All in One Printer are available online for free. You can easily download all the documents as PDF.

Page 31

    Page 30 of 93 
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved. 
Terms Definitions 
Users for stored and 
received documents A list of the normal users who are authorised to read and delete received fax 
documents. 
Folder transmission  A function that sends documents from the MFP via networks to a shared folder 
in an SMB Server by using SMB protocol or that sends documents to a shared 
folder in an FTP Server by using FTP protocol. The following documents can be 
delivered to folders:...

Page 32

    Page 31 of 93 
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved. 
2 Conformance Claim 
This section describes Conformance Claim. 
2.1  CC Conformance Claim 
The CC conformance claim of this ST and TOE is as follows: 
-  CC version for which this ST and TOE claim conformance 
Part 1: 
Introduction and general model July 2009 Version 3.1 Revision 3 Final (Japanese translation ver.1.0 
Final) CCMB-2009-07-001 
Part 2: 
Security functional components July 2009 Version 3.1 Revision 3 Final...

Page 33

    Page 32 of 93 
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved. 
2600.1-SMI conformant 
2.4  Conformance Claim Rationale 
2.4.1  Consistency Claim with TOE Type in PP 
The targeted product type by the PP is the Hardcopy devices (hereafter, HCDs). The HCDs consist of the 
scanner device and print device, and have the interface to connect telephone line. The HCDs combine these 
devices and equip one or more functions of Copy Function, Scanner Function, Printer Function or Fax 
Function. The...

Page 34

    Page 33 of 93 
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved. 
 
For those points mentioned above, the security problems and security objectives in this ST are consistent 
with those in the PP. 
2.4.3  Consistency Claim with Security Requirements in PP 
The SFRs for this TOE consist of the Common Security Functional Requirements, 2600.1-PRT, 2600.1-SCN, 
2600.1-CPY, 2600.1-FAX, 2600.1-DSR, and 2600.1-SMI. 
The Common Security Functional Requirements are the indispensable SFR specified by...

Page 35

    Page 34 of 93 
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved. 
Ownership of Received Fax Documents 
For the ownership of the received fax documents, the TOE has the characteristic that the ownership of the 
document is assigned to the intended user. This is according to PP APPLICATION NOTE 93. 
Augmentation of FCS_CKM.1 and FCS_COP.1 
This TOE claims O.STORAGE.ENCRYPTED as the security objectives for the data protection applied to 
non-volatile memory media that are neither allowed to be...

Page 36

    Page 35 of 93 
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved. 
The TOE allows the MFP administrator to delete document data and user jobs (document access control SFP, 
FDP_ACC.1(a) and FDP_ACF.1(a)), and as a result, the TSF restrictively allows the MFP administrator to 
access the TOE functions. Therefore, the requirements described in FDP_ACF.1.3(b) in the PP are satisfied 
at the same time. The fax reception process, which is accessed when receiving from a telephone line, is...

Page 37

    Page 36 of 93 
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved. 
3  Security Problem Definitions 
This section describes Threats, Organisational Security Policies and Assumptions. 
3.1 Threats 
Defined and described below are the assumed threats related to the use and environment of this TOE. The 
threats defined in this section are unauthorised persons with knowledge of published information about the 
TOE operations and such attackers are capable of Basic attack potential. 
T.DOC.DIS...

Page 38

    Page 37 of 93 
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved. 
3.2  Organisational Security Policies 
The following organisational security policies are taken: 
P.USER.AUTHORIZATION   User  identification and authentication 
Only users with operation permission of the TOE shall be authorised to use the TOE. 
P.SOFTWARE.VERIFICATION Software verification 
Procedures shall exist to self-verify executable code in the TSF. 
P.AUDIT.LOGGING      Management of audit log records 
The TOE shall...

Page 39

    Page 38 of 93 
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved. 
A.ADMIN.TRAINING   Administrator  training 
Administrators are aware of the security policies and procedures of their organisation, 
are competent to correctly configure and operate the TOE in accordance with the 
guidance document following those policies and procedures. 
A.ADMIN.TRUST   Trusted administrator 
The responsible manager of MFP selects administrators who do not use their privileged 
access rights for malicious...

Page 40

    Page 39 of 93 
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved. 
4 Security Objectives 
This section describes Security Objectives for TOE, Security Objectives of Operational Environment and 
Security Objectives Rationale. 
4.1  Security Objectives for TOE 
This section describes the security objectives for the TOE. 
O.DOC.NO_DIS    Protection of document disclosure 
The TOE shall protect documents from unauthorised disclosure by persons without a 
login user name, or by persons with a...
Start reading Ricoh Mp C3001 Instruction Manual

Related Manuals for Ricoh Mp C3001 Instruction Manual

All Ricoh manuals