Implementing Robust Security Features
1053-06H
Authorized users may incur unanticipated losses from attacks by malicious third parties, such as sning, spooî ´ng,
and tampering of data as it î µows over a network. To protect your important and valuable information from these
attacks, the machine supports the following features to enhance security and secrecy.
TLS Encrypted Communication
TLS is a protocol for encryption for data sent over a network and is often used for communication via a Web
browser or an e-mail application. TLS enables secure network communication when you access the machine
from a computer via the Remote UI.
Encrypting Communication of Print Data for Mobile Devices with
TLS(P. 276)
Using Key Pairs and Digital Certiî ´cates
A key pair system uses two differing keys, one for encrypting data (public key) and one for decrypting the data
(private key). Installing a key pair together with a digital certiî ´cate can prevent impersonation, falsiî ´cation,
eavesdropping, etc. Conî ´guring Settings for Key Pairs and Digital Certiî ´cates(P. 279)
Security
396