Aficio MLP150DN Informações Técnicas Página 4

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 72
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 3
Network Security White Paper ver. G.1.2
Page 4 of 72
Table of Contents:
1. Introduction ..................................................................................................................9
1-1 Port Based Network Services and Potential Security Issues ................................9
1-2 TELNET ..............................................................................................................10
1-2-1 Function Overview: ..................................................................................10
1-2-2 Potential Threats ......................................................................................10
1-2-3 Possibility of Acting as a Server for Relaying Viruses ..............................10
1-2-4 Theft of Username and Password............................................................10
1-2-5 Interception of network packets:............................................................... 11
1-2-6 Brute force password crack:..................................................................... 11
1-2-7 Possibility of Successful DoS (Denial of Service) Attacks ........................ 11
1-2-8 Recommended Precautions ..................................................................... 11
1-3 FTP .....................................................................................................................12
1-3-1 Function Overview ...................................................................................12
1-3-2 Potential Threats: .....................................................................................12
1-3-3 Recommended Precautions .....................................................................13
1-4 SFTP (SSH2) ......................................................................................................13
1-4-1 Function Overview ...................................................................................13
1-4-2 Destruction, Corruption and Modification of the File System or Kernel ....14
1-4-3 Possibility of Acting as a Server for Relaying Viruses ..............................14
1-4-4 Theft of Username, Password, and Device Information ...........................14
1-4-5 Brute force password crack:.....................................................................14
1-4-6 Theft of Print Data ....................................................................................14
1-4-7 Possibility of Successful DOS (Denial of Service) Attacks .......................14
1-4-8 Recommended Precaution.......................................................................14
1-5 HTTP ..................................................................................................................15
1-5-1 Function Overview ...................................................................................15
1-5-2 Destruction, Corruption and Modification of the File System....................15
1-5-3 Possibility of Acting as a Server for Relaying Viruses ..............................15
1-5-4 Theft of Username and Password............................................................15
1-5-5 Theft of Print Data ....................................................................................15
Vista de página 3
1 2 3 4 5 6 7 8 9 ... 71 72

Comentários a estes Manuais

Sem comentários