EasyManua.ls Logo

Kyocera TASKalfa 3500i - 3 Security Problem Definition; Threats; Organizational Security Policies; Assumptions

Kyocera TASKalfa 3500i
30 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
TASKalfa 3500i, TASKalfa 4500i, TASKalfa 5500i
Data Security Kit (E) Overseas Version Security Target
© 2011 KYOCERA MITA Corporation
10
3. SECURITY PROBLEM DEFINITION
This chapter describes threats, organizational security policies and assumptions.
3.1. Threats
There is no threat that the TOE assumes.
3.2. Organizational Security Policies
Organizational security policies that the TOE must comply with are as follows.
P.OVERWRITE: Overwrite-erase of the residue data.
As a requirement of the organization, it shall be impossible to reuse the residue data
of the HDD to prevent unauthorized read the residue data.
P.ENCRYPT: Encryption of the temporary stored data.
As a requirement of the organization, the temporary stored data of the HDD shall be
encrypted to prevent unauthorized read the temporary stored data.
3.3. Assumptions
The assumptions for the TOE are described as follows:
A.LOCATION: Safe security of the TOE in the operational environment
It is assumed that the MFP operates in the managed environment to prevent the
security breach of TOE by the attack that might be done to the hardware of MFP.
A.NETWORK: Safety of the TOE from the external network
It is assumed that the TOE is used by connecting to the internal network that is
protected against unauthorized access from the external network.
A.CE: The service person reliability
It is assumed that the service person is a reliable person and does not act
unfaithfully.

Table of Contents

Other manuals for Kyocera TASKalfa 3500i

Related product manuals