EasyManua.ls Logo

Xerox WorkCentre 7835 User Manual

Xerox WorkCentre 7835
83 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
Document Version 2.0, Revision 2.0
Xerox Multi-Function Device
Security Target
WorkCentre 5845, 5855, 5865, 5875,
5890, 7220, 7225, 7830, 7835, 7845, 7855
& ColorQube 9301, 9302, 9303
Prepared by:
Xerox Corporation
Computer Sciences Corporation
800 Phillips Road
7231 Parkway Drive
Webster, New York 14580
Hanover, Maryland 21076

Table of Contents

Other manuals for Xerox WorkCentre 7835

Question and Answer IconNeed help?

Do you have a question about the Xerox WorkCentre 7835 and is the answer not in the manual?

Xerox WorkCentre 7835 Specifications

General IconGeneral
Print Resolution1200 x 2400 dpi
Copy Resolution600 x 600 dpi
Scan Resolution600 x 600 dpi
Duplex PrintingYes
Processor Speed1.2 GHz
Hard Drive160 GB
Print SpeedUp to 35 ppm
Monthly Duty Cycle110, 000 pages
Connectivity10/100/1000Base-T Ethernet, USB 2.0
FunctionsPrint, copy, scan, fax
Supported Paper SizesA3, A4, A5, B4, B5
Memory2 GB
PDLPCL 6, PDF, XPS, TIFF, JPEG
Displaycolor touchscreen

Summary

1. Introduction

1.1. ST and TOE Identification

Provides key identification details for the TOE and ST for CC evaluation.

1.2. TOE Overview

Describes the MFD's capabilities and security features.

1.3. TOE Description

Details the physical components and models covered by the TOE.

1.4. Evaluated Configuration

Lists features enabled and excluded in the evaluated configuration.

2. Conformance Claims

2.1. Common Criteria Conformance Claims

States conformance to Common Criteria (CC) versions and assurance levels.

2.2. Protection Profile Claims

Claims conformance to the IEEE Std 2600.2-2008 Protection Profile.

2.3. Package Claims

Details conformance to EAL2 package and specific IEEE Std 2600.2 packages.

2.4. Rationale

Explains the basis for conformance claims and ST modifications.

3. Security Problem Definition

3.1. Definitions

Defines entities, assets, operations, and channels relevant to the security problem.

3.2. Assumptions

Outlines conditions assumed to be true for the TOE's security.

3.3. Threats

Identifies potential security risks and threat agents targeting TOE assets.

3.4. Organizational Security Policies

Lists security rules and guidelines applied to the TOE by the organization.

4. Security Objectives

4.1. Security Objectives for the TOE

Details the security objectives the TOE itself must fulfill.

4.2. Security Objectives for the Operational Environment

Outlines security objectives for the TOE's surrounding IT environment.

4.3. Security Objectives for the Non-IT Environment

Specifies security objectives for non-IT aspects of the environment.

4.4. Rationale for Security Objectives

Explains how objectives address threats, policies, and assumptions.

5. Extended Components Definition

5.1. FPT_FDI_EXP Restricted forwarding of data to external interfaces

Defines a new security component for controlling data forwarding between interfaces.

6. Security Requirements

6.1. Conventions

Explains formatting and identification conventions used for requirements.

6.2. TOE Security Policies

Defines specific security policies enforced by the TSF.

6.3. Security Functional Requirements

Lists and describes the TOE's security functional requirements.

7. TOE Summary Specification

7.1. TOE Security Functions

Provides an overview of the security functions implemented by the TOE.

8. Glossary

9. Acronyms

10. Bibliography

Related product manuals