Table Of Contents - Samsung MFP SECURITY White Paper

Table of Contents

Advertisement

SAMSUNG MFP SECURITY
1. Introduction ....................................................................................................................................... 6
1.1 Information Security .............................................................................................................................. 6
1.2 The Objectives of Multifunction Printer (MFP) Security ........................................................................ 7
1.2.1 MFP Hardcopy Vulnerability ....................................................................................................... 8
1.2.2 MFP Electronic Vulnerability ....................................................................................................... 8
1.2.3 Common Results of Having an Unsecured MFP ......................................................................... 8
2. Security Regulatory Requirements ....................................................................................................... 9
3. Security Business Requirements ........................................................................................................ 10
3.1.1 Government .............................................................................................................................. 10
3.1.2 Education .................................................................................................................................. 11
3.1.3 Healthcare ................................................................................................................................. 11
3.2 Private Sector Security Requirements .................................................................................................. 12
4. Common Criteria Security Validation ................................................................................................. 13
6. Samsung's Security Framework ......................................................................................................... 15
7. Secure User ...................................................................................................................................... 16
7.1 Authentication ...................................................................................................................................... 17
7.1.1 System Authentication .............................................................................................................. 17
7.1.2 Local Authentication ................................................................................................................. 17
7.1.3 Network Authentication ........................................................................................................... 17
7.1.4 XOA -E / XOA Web Authentication ........................................................................................... 17
7.2 User Authentication Scenarios ............................................................................................................. 18
7.2.1 For Administrators .................................................................................................................... 18
7.3 Authorization (Group/Role Management) ........................................................................................... 19
7.3.1 Using Group and Role-Based Authority .................................................................................... 19
7.4 User Authorization Scenarios ............................................................................................................... 20
7.4.1 Administrator Menu ................................................................................................................. 20
7.5 Accounting ............................................................................................................................................ 21
7.5.1 Standard and Network Accounting ........................................................................................... 21
7.6 User Accounting Scenarios ................................................................................................................... 21
7.6.1 For Administrators .................................................................................................................... 21
7.6.2 For Users ................................................................................................................................... 21
7.7 Single Sign-On (SSO) ............................................................................................................................. 22
7.8.1 Good Basic Security................................................................................................................... 22
7.8.2 Increased Productivity .............................................................................................................. 22
7.8.3 Cost Control .............................................................................................................................. 22
8. Secure Data ...................................................................................................................................... 23
Page - 3

Table of Contents

Copyright 2014 Samsung Electronics Co., Ltd., All rights
(2)
.............................................................. 14
reserved.
WHITE PAPER

Advertisement

Table of Contents
loading

Table of Contents