Security Objectives - Fuji Xerox C2265 Manual

Hide thumbs Also See for C2265:
Table of Contents

Advertisement

Table 12 Assumptions / Threats / Organizational Security policies and the Corresponding Security
Objectives
Threats, Policies,
and Assumptions
T.DOC.DIS
T.DOC.ALT
T.FUNC.ALT
T.PROT.ALT
T.CONF.DIS
T.CONF.ALT
P.USER.AUTHORIZATIO
N
P.SOFTWARE.VERIFICA
TION
P.AUDIT.LOGGING
P.INTERFACE.MANAGE
MENT
P.CIPHER
A.ACCESS.MANAGED
A.ADMIN.TRAINING
A.ADMIN.TRUST
A.USER.TRAINING
Threats, policies, and
assumptions
T.DOC.DIS
Fuji Xerox C2265/C2263
                
                
                
                
                
                
  
 
  
   
         
  
   
                   
                  
                  
                  
                  
Table 13 Security Objectives Rationale for Security Problem
Summary
User Document Data
may be disclosed to
unauthorized persons.
Security Target
Objectives
 



 

 
Objectives and rationale
O.DOC.NO_DIS protects D.DOC from
unauthorized disclosure.
O.USER.AUTHORIZED establishes user
identification and authentication as the basis
- 30 -
Copyright
  
  
 
  
      


2016 by Fuji Xerox Co., Ltd
 

Advertisement

Table of Contents
loading

This manual is also suitable for:

C2263

Table of Contents