Page 34 of
91
Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved.
3 Security Problem Definitions
This section describes Threats, Organisational Security Policies and Assumptions.
3.1
Threats
Defined and described below are the assumed threats related to the use and environment of this TOE. The
threats defined in this section are unauthorised persons with knowledge of published information about the
TOE operations and such attackers are capable of Basic attack potential.
T.DOC.DIS
Document disclosure
Documents under the TOE management may be disclosed to persons without a login
user name, or to persons with a login user name but without an access permission to the
document.
T.DOC.ALT
Document alteration
Documents under the TOE management may be altered by persons without a login user
name, or by persons with a login user name but without an access permission to the
document.
T.FUNC.ALT
User job alteration
User jobs under the TOE management may be altered by persons without a login user
name, or by persons with a login user name but without an access permission to the user
job.
T.PROT.ALT
Alteration of TSF protected data
TSF Protected Data under the TOE management may be altered by persons without a
login user name, or by persons with a login user name but without an access permission
to the TSF Protected Data.
T.CONF.DIS
Disclosure of TSF confidential data
TSF Confidential Data under the TOE management may be disclosed to persons without
a login user name, or to persons with a login user name but without an access
permission to the TSF Confidential Data.
T.CONF.ALT
Alteration of TSF confidential data
TSF Confidential Data under the TOE management may be altered by persons without a
login user name, or by persons with a login user name but without an access permission
to the TSF Confidential Data.