Xerox D110/D125 Copier/Printer
セキュリティターゲット
- 22 – Copyright
2012 by Fuji Xerox Co., Ltd
functions for which they are not authorized.
c) Persons who are authorized to use the TOE who may attempt to access data
in ways for which they are not authorized.
d) Persons who unintentionally cause a software malfunction that may expose
the TOE to unanticipated threats.
3.1.3. 脅威 (Threats)
本 TOE に対する脅威を、Tabl e 7 に記述する。unauthorized persons は 3.1.2 の脅威エージェント
であると想定する。
Table 7 利用者データ と TSF データに対する脅威
Threat Affected asset Description
T.DOC.DIS D.DOC User Document Data may be disclosed to
unauthorized persons
T.DOC.ALT D.DOC User Document Data may be altered by
unauthorized persons
T.FUNC.ALT D.FUNC User Function Data may be altered by
unauthorized persons
T.PROT.ALT D.PROT TSF Protected Data may be altered by
unauthorized persons
T.CONF.DIS D.CONF TSF Confidential Data may be disclosed to
unauthorized persons
T.CONF.ALT D.CONF TSF Confidential Data may be altered by
unauthorized persons
3.2. 組織のセキュリティ方針 (Organizational Security Policies)
本 TOE が順守しなければならない組織のセキュリティ方針を Tabl e 8 に記述する。
Table 8 組織のセキュリティ方針
Name Definition
P.USER.AUTHORIZATION To preserve operational accountability and security,
Users will be authorized to use the TOE only as permitted
by the TOE Owner
P.SOFTWARE.VERIFICATION To detect unintentional malfunction of the TSF,
procedures will exist to self-verify executable code in the
TSF