beautypg.com

List of figures and tables – Dell C7765DN MFP Color Laser Printer User Manual

Page 4

background image

iii

- List of Figures and Tables -

Figure 1: General Operational Environment .......................................................... 5

Figure 2: MFD Units and TOE Logical Scope .......................................................... 9

Figure 3: Authentication Flow for Private Print and Mailbox ................................... 12

Figure 4: MFD Units and TOE Physical Scope ...................................................... 17

Figure 5: Assets under and not under Protection ................................................. 21


Table 1: Function Types and Functions Provided by the TOE .................................... 2

Table 2: User Role Assumptions .......................................................................... 8

Table 3: TOE Basic Functions .............................................................................. 9

Table 4: Categories of TOE Setting Data............................................................. 21

Table 5: Threats Addressed by the TOE .............................................................. 22

Table 6: Organizational Security Policy ............................................................... 23

Table 7: Assumptions ...................................................................................... 23

Table 8: Security Objectives for the TOE ............................................................ 24

Table 9: Security Objectives for the Environment ................................................ 25

Table 10: Assumptions / Threats / Organizational Security Policies and the

Corresponding Security Objectives ............................................................... 25

Table 11: Security Objectives Rationale for Security Problem ................................ 26

Table 12: Auditable Events of TOE and Individually Defined Auditable Events .......... 35

Table 13: Operations between Subjects and Objects Covered by MFD Access Control SFP

.............................................................................................................. 41

Table 14: Rules for Access Control .................................................................... 42

Table 15: Rules for Explicit Access Authorization ................................................. 43

Table 16: Subjects, Information, and Operations that cause the information to flow . 44

Table 17: List of Security Functions ................................................................... 51

Table 18: Security Attributes and Authorized Roles .............................................. 52

Table 19 Initialization property ........................................................................ 53

Table 20: Operation of TSF Data ....................................................................... 54

Table 21: Security Management Functions Provided by TSF .................................. 55

Table 22: EAL3 Assurance Requirements ............................................................ 60

Table 23: Security Functional Requirements and the Corresponding Security Objectives

.............................................................................................................. 61

Table 24: Security Objectives to SFR Rationale ................................................... 62

Table 25: Dependencies of Functional Security Requirements ................................ 66

Table 26: Security Functional Requirements and the Corresponding TOE Security

Functions ................................................................................................. 70

Table 27: Management of security attributes ...................................................... 75

Table 28: Access Control .................................................................................. 76

Table 29: Details of Security Audit Log Data ....................................................... 80