EasyManua.ls Logo

Canon EOS M6 Mark II - Security

Canon EOS M6 Mark II
606 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
478
Security
If security settings have not been properly set, the following problems may
occur.
z
Transmission monitoring
Third parties with malicious intent may monitor the Wi-Fi transmissions
and attempt to acquire the data you are sending.
z
Unauthorized network access
Third parties with malicious intent may gain unauthorized access to
the network you are using to steal, modify, or destroy information.
Additionally, you could fall victim to other types of unauthorized access
such as impersonation (where someone assumes an identity to gain
access to unauthorized information) or springboard attacks (where
someone gains unauthorized access to your network as a springboard to
cover their tracks when inltrating other systems).
It is recommended to make use of the systems and functions to thoroughly
secure your network, preventing these types of problems from occurring.

Table of Contents

Other manuals for Canon EOS M6 Mark II

Related product manuals