List of figures and tables – Dell C5765DN MFP Color Laser Printer User Manual

Page 4

Advertising
background image

iii

- List of Figures and Tables -

Figure 1: General Operational Environment .......................................................... 5

Figure 2: MFD Units and TOE Logical Scope .......................................................... 9

Figure 3: Authentication Flow for Private Print and Mailbox ................................... 12

Figure 4: MFD Units and TOE Physical Scope ...................................................... 16

Figure 5: Assets under and not under Protection ................................................. 20


Table 1: Function Types and Functions Provided by the TOE .................................... 2

Table 2: User Role Assumptions .......................................................................... 8

Table 3: TOE Basic Functions .............................................................................. 9

Table 4: Categories of TOE Setting Data............................................................. 20

Table 5: Threats Addressed by the TOE .............................................................. 21

Table 6: Organizational Security Policy ............................................................... 22

Table 7: Assumptions ...................................................................................... 22

Table 8: Security Objectives for the TOE ............................................................ 23

Table 9: Security Objectives for the Environment ................................................ 24

Table 10: Assumptions / Threats / Organizational Security Policies and the

Corresponding Security Objectives ............................................................... 24

Table 11: Security Objectives Rationale for Security Problem ................................ 25

Table 12: Auditable Events of TOE and Individually Defined Auditable Events .......... 34

Table 13: Operations between Subjects and Objects Covered by MFD Access Control SFP

.............................................................................................................. 40

Table 14: Rules for Access Control .................................................................... 41

Table 15: Rules for Explicit Access Authorization ................................................. 42

Table 16: Subjects, Information, and Operations that cause the information to flow . 43

Table 17: List of Security Functions ................................................................... 50

Table 18: Security Attributes and Authorized Roles .............................................. 51

Table 19 Initialization property ........................................................................ 52

Table 20: Operation of TSF Data ....................................................................... 53

Table 21: Security Management Functions Provided by TSF .................................. 54

Table 22: EAL3 Assurance Requirements ............................................................ 59

Table 23: Security Functional Requirements and the Corresponding Security Objectives

.............................................................................................................. 60

Table 24: Security Objectives to SFR Rationale ................................................... 61

Table 25: Dependencies of Functional Security Requirements ................................ 65

Table 26: Security Functional Requirements and the Corresponding TOE Security

Functions ................................................................................................. 69

Table 27: Management of security attributes ...................................................... 74

Table 28: Access Control .................................................................................. 75

Table 29: Details of Security Audit Log Data ....................................................... 79

Advertising