Specifications
CRP-C0239-01
26
5. Glossary
The abbreviations used in this report are listed below.
CC: Common Criteria for Information Technology Security
Evaluation
CEM: Common Methodology for Information Technology Security
Evaluation
EAL: Evaluation Assurance Level
PP: Protection Profile
SOF: Strength of Function
ST: Security Target
TOE: Target of Evaluation
TSF: TOE Security Functions
The glossaries used in this report are listed below.
Address Book A database containing General User Information for each
General User.
Administrator An authorized TOE user who manages the TOE.
Administrators are given Administrator Roles and perform
administrative operations accordingly. Up to four (4)
Administrators can be registered, and each Administrator is
given one (1) or more Administrator Roles.
Administrator
Role
Management functions given to Administrators. There are
four types of Administrator Roles: User Administration,
Machine Administration, Network Administration and File
Administration. Each Administrator Role is assigned to at
least one of the registered Administrators.
Complexity
Setting for
Password
The minimum combination of character types that can be
registered for passwords.
There are four (4) character types: upper-case letters,
lower-case letters, numbers, and symbols.
There are two complexity setting levels for Complexity
Setting for Password, Level 1 and Level 2. Level 1 requires
passwords with a combination of more than two character
types. Level 2 requires passwords with a combination of more
than three character types.
D-BOX A storage area for Document Data on the HDD.
Deliver to Folder A function that sends the Document Data to folders in SMB
Server or FTP Server from the TOE via networks.