IEEE 2600-2008 en Information Technology Hardcopy Device and System Security (IEEE Computer Society)《信息技术 硬拷贝装置和系统安全》.pdf
《IEEE 2600-2008 en Information Technology Hardcopy Device and System Security (IEEE Computer Society)《信息技术 硬拷贝装置和系统安全》.pdf》由会员分享,可在线阅读,更多相关《IEEE 2600-2008 en Information Technology Hardcopy Device and System Security (IEEE Computer Society)《信息技术 硬拷贝装置和系统安全》.pdf(187页珍藏版)》请在麦多课文档分享上搜索。
1、IEEE Std 2600-2008IEEE Standard for InformationTechnology: Hardcopy Device andSystem SecurityIEEE3 Park Avenue New York, NY 10016-5997, USA30 June 2008IEEE Computer SocietySponsored by theInformation Assurance Committee 2600TMIEEE Std 2600-2008 IEEE Standard for Information Technology: Hardcopy Devi
2、ce and System Security Sponsor Information Assurance Committee of the IEEE Computer Society Approved 27 March 2008 IEEE-SA Standards Board The following companies have agreed to make financial contributions to underwrite the cost of Common Criteria certification of some or all of the IEEE Std 2600-s
3、eries Protection Profiles: Canon Inc.; Fuji Xerox; The Hewlett-Packard Company; InfoPrint Solutions Company; Konica Minolta; Kyocera Mita Corporation; Lexmark International, Inc.; Oc; Oki Printing Solutions; Ricoh Company, Ltd.; Samsung Electronics Co., Ltd.; Sharp Corporation; Toshiba TEC Corporati
4、on; Xerox Corporation Abstract: This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security, and information security) for manufacturers, users, and others on the selection,
5、installation, configuration, and usage of hardcopy devices (HCDs) and systems, including printers, copiers, and multifunction devices (MFDs), and the computer systems that support these devices. This standard identifies security exposures for these HCDs and systems, and instructs manufacturers and s
6、oftware developers on appropriate security capabilities to include in their devices and systems, and instructs users on appropriate ways to use these security capabilities. Keywords: all-in-one, copier, facsimile, fax, hardcopy device, HCD, information security, MFD, MFP, multifunction device, multi
7、function product, printer, scanner The Institute of Electrical and Electronics Engineers, Inc. 3 Park Avenue, New York, NY 10016-5997, USA Copyright 2008 by the Institute of Electrical and Electronics Engineers, Inc. All rights reserved. Published 30 June 2008. Printed in the United States of Americ
8、a. IEEE is a registered trademark in the U.S. Patent +1 978 750 8400. Permission to photocopy portions of any individual standard for educational classroom use can also be obtained through the Copyright Clearance Center. Introduction This introduction is not part of IEEE Std 2600-2008, IEEE Standard
9、 for Information Technology: Hardcopy Device and System Security. This standard defines the security requirements and guidance for manufacturers, information technology (IT) professionals, users, and others on the selection, installation, configuration, and usage of secure hardcopy devices (HCDs) an
10、d systems. The standard defines unique security requirements for HCDs in four different usage environments that map to most HCD installations. This standard is part of a family of standards that are related to HCD and system security. IEEE P2600.1 B34,aIEEE P2600.2 B35, IEEE P2600.3 B36, and IEEE P2
11、600.4 B37 provide Common Criteria protection profiles that can be used by manufacturers to create Common Criteria version 3.1 conformant Security Target documents for use in the Common Criteria certification program. Respectively, IEEE P2600.1, IEEE P2600.2, IEEE P2600.3, and IEEE P2600.4 are protec
12、tion profiles that correspond to Operational Environments A, B, C, and D, as defined in this standard. The requirements for each environment listed in the compliance clause in this standard map directly to the required security objectives in the profile documents. This standard also defines addition
13、al security guidance and recommendations for non-IT security techniques that are beyond the scope of Common Criteria certification and for IT security techniques that cannot be exhaustively tested and verified in the Common Criteria certification program. Notice to users Laws and regulations Users o
14、f these documents should consult all applicable laws and regulations. Compliance with the provisions of this standard does not imply compliance to any applicable regulatory requirements. Implementers of the standard are responsible for observing or referring to the applicable regulatory requirements
15、. IEEE does not, by the publication of its standards, intend to urge action that is not in compliance with applicable laws, and these documents may not be construed as doing so. Copyrights This document is copyrighted by the IEEE. It is made available for a wide variety of both public and private us
16、es. These include both use, by reference, in laws and regulations, and use in private self-regulation, standardization, and the promotion of engineering practices and methods. By making this document available for use and adoption by public authorities and private users, the IEEE does not waive any
17、rights in copyright to this document. Updating of IEEE documents Users of IEEE standards should be aware that these documents may be superseded at any time by the issuance of new editions or may be amended from time to time through the issuance of amendments, corrigenda, or errata. An official IEEE
18、document at any point in time consists of the current edition of the document together with any amendments, corrigenda, or errata then in effect. In order to determine aThe numbers in brackets correspond to those of the bibliography in Annex B. iv Copyright 2008. All rights reserved. whether a given
19、 document is the current edition and whether it has been amended through the issuance of amendments, corrigenda, or errata, visit the IEEE Standards Association Web site at http:/ieeexplore.ieee.org/xpl/standards.jsp, or contact the IEEE at the address listed previously. For more information about t
20、he IEEE Standards Association or the IEEE standards development process, visit the IEEE-SA Web site at http:/standards.ieee.org. Errata Errata, if any, for this and all other standards can be accessed at the following URL: http:/standards.ieee.org/reading/ieee/updates/errata/index.html. Users are en
21、couraged to check this URL for errata periodically. Interpretations Current interpretations can be accessed at the following URL: http:/standards.ieee.org/reading/ieee/interp/ index.html. Patents Attention is called to the possibility that implementation of this standard may require use of subject m
22、atter covered by patent rights. By publication of this standard, no position is taken with respect to the existence or validity of any patent rights in connection therewith. A patent holder or patent applicant has filed a statement of assurance that it will grant licenses under these rights without
23、compensation or under reasonable rates, with reasonable terms and conditions that are demonstrably free of any unfair discrimination to applicants desiring to obtain such licenses. Other Essential Patent Claims may exist for which a statement of assurance has not been received. The IEEE is not respo
24、nsible for identifying Essential Patent Claims for which a license may be required, for conducting inquiries into the legal validity or scope of Patents Claims, or determining whether any licensing terms or conditions provided in connection with submission of a Letter of Assurance, if any, or in any
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- IEEE26002008ENINFORMATIONTECHNOLOGYHARDCOPYDEVICEANDSYSTEMSECURITYIEEECOMPUTERSOCIETY 信息技术 硬拷贝 装置 系统安全

链接地址:http://www.mydoc123.com/p-1248605.html