List of tables – Konica Minolta BIZHUB 920 User Manual
Page 6
List of Tables
Table 8.1 Correspondence between Threats, Assumptions, and Security Objectives Policies......... 73
Table 8.2 Correspondence between Security Objectives Policies and IT Security Functional………
Table 8.4 Correspondence between IT Security Functions and Security Functional Requirements 86
Copyright© 2005 KONICA MINOLTA BUSINESS TECHNOLOGIES, INC., All Rights Reserved