Fuji Xerox C2265 Manual page 3

Hide thumbs Also See for C2265:
Table of Contents

Advertisement

6.1.2.
Class FCS: Cryptographic Support ............................................................................................................. 50
6.1.3.
Class FDP: User Data Protection ................................................................................................................ 51
6.1.4.
Class FIA: Identification and Authentication ....................................................................................... 67
6.1.5.
Class FMT: Security Management ............................................................................................................ 70
6.1.6.
Class FPT: Protection of the TSF ................................................................................................................ 90
6.1.7.
Class FTA: TOE Access ..................................................................................................................................... 92
6.1.8.
Class FTP: Trusted Path/Channels ............................................................................................................. 92
6.2.
Security Assurance Requirements ...................................................................................................... 93
6.3.
Security Requirement Rationale ......................................................................................................... 94
6.3.1.
Security Functional Requirements Rationale ........................................................................................ 94
6.3.2.
Dependencies of Security Functional Requirements ....................................................................... 102
6.3.3.
Security Assurance Requirements Rationale ...................................................................................... 107
7.
TOE SUMMARY SPECIFICATION ................................................................................. 108
7.1.
Security Functions ................................................................................................................................. 108
7.1.1.
Hard Disk Data Overwrite (TSF_IOW) ................................................................................................... 110
7.1.2.
Hard Disk Data Encryption (TSF_CIPHER) .......................................................................................... 111
7.1.3.
User Authentication (TSF_USER_AUTH) ............................................................................................. 111
7.1.4.
System Administrator's Security Management (TSF_FMT) ........................................................ 117
7.1.5.
Customer Engineer Operation Restriction (TSF_CE_LIMIT) ........................................................ 119
7.1.6.
Security Audit Log (TSF_FAU) ................................................................................................................... 120
7.1.7.
Internal Network Data Protection (TSF_NET_PROT) ..................................................................... 122
7.1.8.
Information Flow Security (TSF_INF_FLOW) ..................................................................................... 124
7.1.9.
Self Test (TSF_S_TEST) ................................................................................................................................ 125
8.
ACRONYMS AND TERMINOLOGY ............................................................................... 126
8.1.
Acronyms .................................................................................................................................................. 126
8.2.
Terminology ............................................................................................................................................. 127
9.
REFERENCES ........................................................................................................................ 131
- ii -

Advertisement

Table of Contents
loading

This manual is also suitable for:

C2263

Table of Contents