Shopping Cart

No products in the cart.

IEEE 2600.4-2010

$59.04

IEEE Standard Protection Profile for Hardcopy Devices in IEEE Std 2600(TM)-2008 Operational Environment D

Published By Publication Date Number of Pages
IEEE 2010 42
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

New IEEE Standard – Inactive-Reserved. Standard for a Protection Profile for Hardcopy Devices in a small, private information processing environment in which most elements of security are provided by the physical environment, but basic network security is needed to protect the device and its network from misuse from outside of the environment. Small offices and home offices are typical applications of this environment. This environment will be known as “Operational Environment D.

PDF Catalog

PDF Pages PDF Title
1 IEEE Std 2600.4-2010 Front Cover
3 Title Page
4 Abstract/Keywords
6 Introduction
For more information
Notice to users
Laws and regulations
Copyrights
Updating of IEEE documents
7 Errata
Interpretations
Patents
8 Participants
Acknowledgments
10 Contents
13 Important Notice
1. Overview
1.1 Scope
1.2 Purpose
1.3 Application notes
14 1.4 Notational conventions
2. Normative references
15 3. Protection Profile introduction (APE_INT)
3.1 Protection Profile usage
3.2 Protection Profile reference
4. Hardcopy Device overview (APE_INT)
4.1 Typical products
16 4.2 Typical usage
5. TOE Overview (APE_INT)
5.1 TOE functions
17 5.2 TOE model
18 5.3 Entity definitions
20 5.4 TOE operational model
6. Conformance claims (APE_CCL)
6.1 Conformance to Common Criteria
6.2 Conformance to other Protection Profiles
6.3 Conformance to Packages
21 6.4 Conformance to this Protection Profile
7. Security Problem Definition (APE_SPD)
7.1 Threats agents
22 7.2 Threats to TOE Assets
7.3 Organizational Security Policies for the TOE
7.4 Assumptions
8. Security Objectives (APE_OBJ)
8.1 Security Objectives for the TOE
23 8.2 Security Objectives for the IT environment
8.3 Security Objectives for the non-IT environment
8.4 Security Objectives rationale
25 9. Extended components definition (APE_ECD)
9.1 FPT_FDI_EXP Restricted forwarding of data to external interfaces
27 10. Common Security Functional Requirements (APE_REQ)
10.1 Class FAU: Security audit
10.2 Class FCO: Communication
10.3 Class FCS: Cryptographic support
10.4 Class FDP: User data protection
10.5 Class FIA: Identification and authentication
29 10.6 Class FMT: Security management
30 10.7 Class FPR: Privacy
31 10.8 Class FPT: Protection of the TSF
10.9 Class FRU: Resource utilization
10.10 Class FTA: TOE access
10.11 Class FTP: Trusted paths/channels
10.12 Common security requirements rationale
33 11. Security Assurance Requirements (APE_REQ)
34 12. SFR Packages introduction
12.1 SFR Packages usage
12.2 SFR Packages reference
35 12.3 SFR Package functions
12.4 SFR Package attributes
13. 2600.4-SMI SFR Package for Hardcopy Device Shared-medium Interface Functions, Operational Environment D
13.1 SMI SFR Package introduction
13.2 Class FPT: Protection of the TSF
36 13.3 Class FTP: Trusted paths/channels
13.4 SMI security requirements rationale
38 Annex A (normative) Glossary
41 Annex B (normative) Acronyms
42 Annex C (informative) Bibliography
IEEE 2600.4-2010
$59.04