Aficio MLP150DN Informacje Techniczne Strona 4

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 72
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 3
Network Security White Paper ver. G.1.2
Page 4 of 72
Table of Contents:
1. Introduction ..................................................................................................................9
1-1 Port Based Network Services and Potential Security Issues ................................9
1-2 TELNET ..............................................................................................................10
1-2-1 Function Overview: ..................................................................................10
1-2-2 Potential Threats ......................................................................................10
1-2-3 Possibility of Acting as a Server for Relaying Viruses ..............................10
1-2-4 Theft of Username and Password............................................................10
1-2-5 Interception of network packets:............................................................... 11
1-2-6 Brute force password crack:..................................................................... 11
1-2-7 Possibility of Successful DoS (Denial of Service) Attacks ........................ 11
1-2-8 Recommended Precautions ..................................................................... 11
1-3 FTP .....................................................................................................................12
1-3-1 Function Overview ...................................................................................12
1-3-2 Potential Threats: .....................................................................................12
1-3-3 Recommended Precautions .....................................................................13
1-4 SFTP (SSH2) ......................................................................................................13
1-4-1 Function Overview ...................................................................................13
1-4-2 Destruction, Corruption and Modification of the File System or Kernel ....14
1-4-3 Possibility of Acting as a Server for Relaying Viruses ..............................14
1-4-4 Theft of Username, Password, and Device Information ...........................14
1-4-5 Brute force password crack:.....................................................................14
1-4-6 Theft of Print Data ....................................................................................14
1-4-7 Possibility of Successful DOS (Denial of Service) Attacks .......................14
1-4-8 Recommended Precaution.......................................................................14
1-5 HTTP ..................................................................................................................15
1-5-1 Function Overview ...................................................................................15
1-5-2 Destruction, Corruption and Modification of the File System....................15
1-5-3 Possibility of Acting as a Server for Relaying Viruses ..............................15
1-5-4 Theft of Username and Password............................................................15
1-5-5 Theft of Print Data ....................................................................................15
Przeglądanie stron 3
1 2 3 4 5 6 7 8 9 ... 71 72

Komentarze do niniejszej Instrukcji

Brak uwag