EasyManuals Logo

Honeywell touchpoint Pro Security Guide

Honeywell touchpoint Pro
12 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #4 background imageLoading...
Page #4 background image
CONTENTS
Touchpoint Pro
Pt. No. 2400M2567_1 4 Security Guide
1 Contents
1 Contents ........................................................................................................................................... 4
2 Introduction ..................................................................................................................................... 5
2.1 Scope .................................................................................................................................. 5
2.2 Assumptions and pre-requisites .......................................................................................... 5
2.3 Related documents ............................................................................................................. 5
2.4 Security Controls ................................................................................................................. 5
2.4.1 Additional User Controls ................................................................................................ 5
2.4.2 Further Information ........................................................................................................ 5
3 IT System Architecture ................................................................................................................... 6
3.1 Ethernet Remote Connections ............................................................................................ 6
3.2 Physical and Local connections .......................................................................................... 6
4 Threats ............................................................................................................................................. 7
4.1 Unauthorised access .......................................................................................................... 7
4.2 Communications snooping .................................................................................................. 7
4.3 Viruses and other malicious software agents ...................................................................... 7
5 Mitigation Strategies ....................................................................................................................... 8
5.1 Touchpoint Pro System ....................................................................................................... 8
5.1.1 Monitor System Access ................................................................................................. 8
5.1.2 User Access and Passwords ......................................................................................... 8
5.1.3 Software and Unusual Operation ................................................................................... 9
5.1.4 Memory Media ............................................................................................................... 9
5.1.5 Configuration Port .......................................................................................................... 9
5.1.6 Software and Firmware Updates ................................................................................... 9
5.2 Computers and Access ....................................................................................................... 9
5.2.1 Operating Software ........................................................................................................ 9
5.2.2 Virus Protection ............................................................................................................. 9
5.2.3 Files and Media ............................................................................................................. 9
5.2.4 User Access and Passwords ....................................................................................... 10
5.3 Networks, Firewalls & VPN connections ........................................................................... 10
5.3.1 Physical Access ........................................................................................................... 10
5.3.2 Firewall and DMZ ......................................................................................................... 10
5.3.3 Internet and VPN ......................................................................................................... 10
6 Glossary ......................................................................................................................................... 11
6.1 Abbreviations .................................................................................................................... 11

Other manuals for Honeywell touchpoint Pro

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Honeywell touchpoint Pro and is the answer not in the manual?

Honeywell touchpoint Pro Specifications

General IconGeneral
BrandHoneywell
Modeltouchpoint Pro
CategoryControl Systems
LanguageEnglish

Related product manuals