Page 36 of
93
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.
3 Security Problem Definitions
This section describes Threats, Organisational Security Policies and Assumptions.
3.1 Threats
Defined and described below are the assumed threats related to the use and environment of this TOE. The
threats defined in this section are unauthorised persons with knowledge of published information about the
TOE operations and such attackers are capable of Basic attack potential.
T.DOC.DIS
Document
disclosure
Documents under the TOE management may be disclosed to persons without a login
user name, or to persons with a login user name but without an access permission to the
document.
T.DOC.ALT
Document
alteration
Documents under the TOE management may be altered by persons without a login user
name, or by persons with a login user name but without an access permission to the
document.
T.FUNC.ALT User
job
alteration
User jobs under the TOE management may be altered by persons without a login user
name, or by persons with a login user name but without an access permission to the user
job.
T.PROT.ALT
Alteration of TSF protected data
TSF Protected Data under the TOE management may be altered by persons without a
login user name, or by persons with a login user name but without an access permission
to the TSF Protected Data.
T.CONF.DIS
Disclosure of TSF confidential data
TSF Confidential Data under the TOE management may be disclosed to persons without
a login user name, or to persons with a login user name but without an access
permission to the TSF Confidential Data.
T.CONF.ALT
Alteration of TSF confidential data
TSF Confidential Data under the TOE management may be altered by persons without a
login user name, or by persons with a login user name but without an access permission
to the TSF Confidential Data.