Do you have a question about the Samsung K4350 and is the answer not in the manual?
Lists objectives for the TOE to counter threats and enforce policies.
Lists all functional security requirements categorized by class (e.g., Audit, Crypto).
Summarizes assurance components for EAL2 augmented by ALC_FLR.2.
Presents security functions performed by the TOE to satisfy SFRs.
Details user identification and authentication methods and policies.
Describes network access control policies for packet and information flow.
Covers management of security functions, TSF data, and attributes.
Details audit record generation, storage, and access capabilities.
Explains functions for securely deleting stored files from the hard drive.
Lists objectives for the TOE to counter threats and enforce policies.
Lists all functional security requirements categorized by class (e.g., Audit, Crypto).
Summarizes assurance components for EAL2 augmented by ALC_FLR.2.
Presents security functions performed by the TOE to satisfy SFRs.
Details user identification and authentication methods and policies.
Describes network access control policies for packet and information flow.
Covers management of security functions, TSF data, and attributes.
Details audit record generation, storage, and access capabilities.
Explains functions for securely deleting stored files from the hard drive.












Loading...