Security Target
Page 80
All rights reserved. Copyright (c) 2011 RICOH COMPANY, LTD. Therefore, cryptographic key destruction by the standard method is unnecessary. 6.3.4 Security Assurance Requirements Rationale This TOE is software for the MFP, which is a ... of 93 The following explains the rationale for acceptability in all cases where a dependency is not satisfied: Rationale for Removing Dependencies on the terms and costs of the evaluation, the evaluation assurance level of EAL3+ALC_FLR.2 is adequate to show the validity of commercially available products. In order to securely operate...
All rights reserved. Copyright (c) 2011 RICOH COMPANY, LTD. Therefore, cryptographic key destruction by the standard method is unnecessary. 6.3.4 Security Assurance Requirements Rationale This TOE is software for the MFP, which is a ... of 93 The following explains the rationale for acceptability in all cases where a dependency is not satisfied: Rationale for Removing Dependencies on the terms and costs of the evaluation, the evaluation assurance level of EAL3+ALC_FLR.2 is adequate to show the validity of commercially available products. In order to securely operate...