Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

1.1.3 Security Target Evaluation Status
1.1.4 Evaluation Assurance Level
1.2.1 Security Target Organisation
1.3 Common Criteria Conformance
1.4 Protection Profile Conformance
1.5 Document Conventions
2 TOE Description
2.1 Overview
2.2 Hardware and Software Versions
Table 1 - Hardware and Software Components
2.3 Architecture Description
Table 2 - Controller Components
2.4 Physical Boundaries
2.5 Logical Boundaries
3 TOE Security Environment
3.1 Threats
3.1.1 Threats Addressed by the TOE
3.1.2 Threats to be Addressed by the Operating Environment
3.2 Assumptions
3.2.1 Personnel Assumptions
3.2.2 Physical Environment Assumptions
3.2.3 IT Environment Assumptions
3.3 Organisational Security Policies
4 Security Objectives
4.1 Security Objectives for the TOE
4.2 Security Objectives for the Operating Environment
4.3 Rationale for Security Objectives for the TOE
Table 3 - Mappings Between Threats and Security Objectives for the TOE
4.4 Rationale for Security Objectives for the Environment
5 IT Security Requirements
Table 5 - Security Functional Requirements
Security Functional Requirements
5.1 TOE Security Functional Requirements
5.1.1 User Data Protection (FDP)
5.1.2 Identification and Authentication (FIA)
5.1.3 Security Management (FMT)
5.2 IT Environment Security Functional Requirements
5.2.1 Protection of the TSF (FPT)
5.3 Explicitly Stated Security Functional Requirements
5.4 TOE Security Assurance Requirements
Table 6 - Assurance Requirements
5.5 TOE Strength of Function Claim
5.6 Rationale for TOE Security Functional Requirements
5.7 Rationale for TOE Security Assurance Requirements
5.8 Rationale for IT Environment Security Requirements
5.9 Rationale for IT Security Requirement Dependencies
Table 9 - Security Functional Requirements
5.10 Rationale for Strength of Function Claim
6 TOE Summary Specification
6.1 TOE Security Functions
6.1.1 Complete Erase
6.1.2 System Manager Logon
6.1.3 Security Management
6.2 Security Assurance Measures and Rationale
Table 10 - Assurance Measures and Rationale
6.3 Rationale for TOE Security Functions
Table 11 - Mapping of Functional Requirements to Security Functions
6.4 Appropriate Strength of Function Claim
7 Protection Profile Claims
7.1 Protection Profile Reference
7.2 Protection Profile Refinements
7.3 Protection Profile Additions
7.4 Protection Profile Rationale
8 Rationale
8.1 Security Objectives Rationale
8.2 Security Requirements Rationale
8.3 TOE Summary Specification Rationale
8.4 Protection Profile Claims Rationale
0 of .
Results for:
No results containing your search query
P. 1
CANON IR St_vid1010-St

CANON IR St_vid1010-St

Ratings: (0)|Views: 17|Likes:
Published by Zacharie Gbadou

More info:

Published by: Zacharie Gbadou on Sep 16, 2010
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 5 to 42 are not shown in this preview.

Activity (2)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->