
bizhub C352 / bizhub C300 / ineo
+
351 / ineo
+
300
Control Software, Security Target
Copyright © 2006 KONICA MINOLTA BUSINESS TECHNOLOGIES, INC., All Rights Reserved.
66 / 110
8. Rational
8.1. Security Objectives Rationale
8.1.1. Necessity
The correspondence between the assumptions, threats and security objectives are shown in the
following table. It shows that the security objectives correspond to at least one assumption or
threat.
Table 9 Conformity of Security Objectives to assumptions and Threats
Assumption/Treat
Security objectives
A.ADMIN
A.SERVICE
A.NETWORK
A.SECRET
A.SETTING
A.SERVER
T.DISCARD-MFP
T.BRING-OUT-STORAGE
T.ACCESS-PRIVATE-BOX
T.ACCESS-PUBLIC-BOX
T.ACCESS-SECURE-PRINT
T.ACCESS-NET-SETTING
T.ACCESS-SETTING
T.BACKUP-RESTORE
O.REGISTERED-USER ●
●
●
O.PRIVATE-BOX ●
O.PUBLIC-BOX ●
O.SECURE-PRINT ●
O.CONFIG ●
●
●
O.OVERWRITE-ALL ●
O.CRYPT-KEY ●
O.CHECK-HDD ●
OE.CRYPT ●
OE.LOCK-HDD ●
OE.FEED-BACK ●
●
●
●
●
●
OE-N.ADMIN ●
OE-N.SERVICE ●
OE-N.NETWORK ●
OE-N.SECRET ●
OE-N.SERVER ●
OE-N.SESSION ●
●
●
●
●
●
OE-N.SETTING-SECURITY ●
Kommentare zu diesen Handbüchern