Aficio MLP150DN Informations techniques Page 4

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 72
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 3
Network Security White Paper ver. G.1.2
Page 4 of 72
Table of Contents:
1. Introduction ..................................................................................................................9
1-1 Port Based Network Services and Potential Security Issues ................................9
1-2 TELNET ..............................................................................................................10
1-2-1 Function Overview: ..................................................................................10
1-2-2 Potential Threats ......................................................................................10
1-2-3 Possibility of Acting as a Server for Relaying Viruses ..............................10
1-2-4 Theft of Username and Password............................................................10
1-2-5 Interception of network packets:............................................................... 11
1-2-6 Brute force password crack:..................................................................... 11
1-2-7 Possibility of Successful DoS (Denial of Service) Attacks ........................ 11
1-2-8 Recommended Precautions ..................................................................... 11
1-3 FTP .....................................................................................................................12
1-3-1 Function Overview ...................................................................................12
1-3-2 Potential Threats: .....................................................................................12
1-3-3 Recommended Precautions .....................................................................13
1-4 SFTP (SSH2) ......................................................................................................13
1-4-1 Function Overview ...................................................................................13
1-4-2 Destruction, Corruption and Modification of the File System or Kernel ....14
1-4-3 Possibility of Acting as a Server for Relaying Viruses ..............................14
1-4-4 Theft of Username, Password, and Device Information ...........................14
1-4-5 Brute force password crack:.....................................................................14
1-4-6 Theft of Print Data ....................................................................................14
1-4-7 Possibility of Successful DOS (Denial of Service) Attacks .......................14
1-4-8 Recommended Precaution.......................................................................14
1-5 HTTP ..................................................................................................................15
1-5-1 Function Overview ...................................................................................15
1-5-2 Destruction, Corruption and Modification of the File System....................15
1-5-3 Possibility of Acting as a Server for Relaying Viruses ..............................15
1-5-4 Theft of Username and Password............................................................15
1-5-5 Theft of Print Data ....................................................................................15
Vue de la page 3
1 2 3 4 5 6 7 8 9 ... 71 72

Commentaires sur ces manuels

Pas de commentaire