Security Threats and Measures on Multifunctional Devices
-д хадгалсан:
| -д хэвлэсэн: | European Conference on Cyber Warfare and Security (Jun 2018), p. 38 |
|---|---|
| Үндсэн зохиолч: | |
| Бусад зохиолчид: | |
| Хэвлэсэн: |
Academic Conferences International Limited
|
| Нөхцлүүд: | |
| Онлайн хандалт: | Citation/Abstract Full Text Full Text - PDF |
| Шошгууд: |
Шошго байхгүй, Энэхүү баримтыг шошголох эхний хүн болох!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 2076998390 | ||
| 003 | UK-CbPIL | ||
| 035 | |a 2076998390 | ||
| 045 | 2 | |b d20180601 |b d20180630 | |
| 084 | |a 142231 |2 nlm | ||
| 100 | 1 | |a Botha, Johnny |u Council for Scientific and Industrial Research (CSIR), Pretoria, South Africa | |
| 245 | 1 | |a Security Threats and Measures on Multifunctional Devices | |
| 260 | |b Academic Conferences International Limited |c Jun 2018 | ||
| 513 | |a Conference Proceedings | ||
| 520 | 3 | |a Multifunctional devices are employed in office networks for functionality and comfort, most often considered only as peripheral devices enabling the printing, copying and scanning of documents. Based on a study performed by InfoTrends in 2013 in the USA and Western Europe, the majority of people surveyed are of the opinion that computers pose the biggest security threats of all technological devices (Forbes, 2017a). In many cases, users of multifunctional devices do not realise that a multifunctional device is also a network device which have similar vulnerabilities, whereby the security threats relating to these devices are often overlooked. This paper provides an overview of the physical and network security risks relating to networked multifunctional devices. It includes a number of experiments and tests performed on multifunctional devices, security analysis, discussions on possible exploits as well as recommendations on various security measures. This paper could serve as a high-level guideline when installing multifunctional devices in a network environment and informing administrators and users of the security risks associated with installation and daily use. | |
| 610 | 4 | |a Kassner | |
| 651 | 4 | |a United States--US | |
| 653 | |a Internet | ||
| 653 | |a Network security | ||
| 653 | |a Copying | ||
| 653 | |a Laser printers | ||
| 653 | |a Electronic devices | ||
| 653 | |a Peripheral equipment (computers) | ||
| 653 | |a Security services | ||
| 653 | |a Cybersecurity | ||
| 653 | |a Security | ||
| 653 | |a Threats | ||
| 653 | |a Experiments | ||
| 653 | |a Installation | ||
| 653 | |a Computers | ||
| 653 | |a Administrators | ||
| 653 | |a Networks | ||
| 700 | 1 | |a Von Solms, Sune |u Department of Electrical Engineering, Faculty of Engineering and the Built Environment University of Johannesburg, South Africa | |
| 773 | 0 | |t European Conference on Cyber Warfare and Security |g (Jun 2018), p. 38 | |
| 786 | 0 | |d ProQuest |t Political Science Database | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/2076998390/abstract/embedded/ZKJTFFSVAI7CB62C?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text |u https://www.proquest.com/docview/2076998390/fulltext/embedded/ZKJTFFSVAI7CB62C?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/2076998390/fulltextPDF/embedded/ZKJTFFSVAI7CB62C?source=fedsrch |