EasyManua.ls Logo

Canon w-e1 - Security

Canon w-e1
98 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
86
If security settings have not been properly set, the following problems
may occur.
Transmission monitoring
Third parties with malicious intent may monitor the wireless LAN
transmissions and attempt to acquire the data you are sending.
Unauthorized network access
Third parties with malicious intent may gain unauthorized access to
the network you are using to steal, modify, or destroy information.
Additionally, you could fall victim to other types of unauthorized
access such as impersonation (where someone assumes an
identity to gain access to unauthorized information) or springboard
attacks (where someone gains unauthorized access to your
network as a springboard to cover their tracks when infiltrating
other systems).
It is recommended to thoroughly secure your network to prevent these
types of problems from occurring.
Security

Table of Contents