EasyManua.ls Logo

Ricoh Aficio MP C2800

Ricoh Aficio MP C2800
80 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Page 31 of 80
Copyright (c) 2009,2010 RICOH COMPANY, LTD. All Rights Reserved.
T.TRANSIT (Data interception and tampering with communication path)
To counter this threat, the TOE protects document data and Print Data on communication path from leakage,
and detects tampering. In addition, the performance of O.NET.PROTECT is recorded as audit logs by
O.AUDIT, and the function to read audit logs is only provided to the machine administrator so that the
machine administrator verifies afterwards whether or not O.NET.PROTECT was performed.
Therefore, the TOE can counter T.TRANSIT.
T.FAX_LINE (Intrusion via telephone line)
To counter this threat, the TOE prevents the intrusion from a telephone line connected to Fax Unit to the
TOE by O.LINE_PROTECT. In addition, the performance of O.LINE_PROTECT is recorded as audit logs
by O.AUDIT, and the function to read audit logs is only provided to the machine administrator so that the
machine administrator detects afterwards whether or not O.LINE_PROTECT was successfully performed.
Therefore, the TOE can counter T.FAX_LINE.
P.SOFTWARE (Checking software integrity)
To enforce this organisational security policy, the TOE provides the function to verify the integrity of MFP
Control Softwa re, which is installed in FlashROM, with the TOE users by O.GENUINE.
Therefore, the TOE can enforce P.SOFTWARE.

Table of Contents

Other manuals for Ricoh Aficio MP C2800

Related product manuals