EasyManua.ls Logo

Honeywell touchpoint Pro - 1 Contents; Table of Contents

Honeywell touchpoint Pro
12 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
CONTENTS
Touchpoint Pro
Pt. No. 2400M2567_1 4 Security Guide
1 Contents
1 Contents ........................................................................................................................................... 4
2 Introduction ..................................................................................................................................... 5
2.1 Scope .................................................................................................................................. 5
2.2 Assumptions and pre-requisites .......................................................................................... 5
2.3 Related documents ............................................................................................................. 5
2.4 Security Controls ................................................................................................................. 5
2.4.1 Additional User Controls ................................................................................................ 5
2.4.2 Further Information ........................................................................................................ 5
3 IT System Architecture ................................................................................................................... 6
3.1 Ethernet Remote Connections ............................................................................................ 6
3.2 Physical and Local connections .......................................................................................... 6
4 Threats ............................................................................................................................................. 7
4.1 Unauthorised access .......................................................................................................... 7
4.2 Communications snooping .................................................................................................. 7
4.3 Viruses and other malicious software agents ...................................................................... 7
5 Mitigation Strategies ....................................................................................................................... 8
5.1 Touchpoint Pro System ....................................................................................................... 8
5.1.1 Monitor System Access ................................................................................................. 8
5.1.2 User Access and Passwords ......................................................................................... 8
5.1.3 Software and Unusual Operation ................................................................................... 9
5.1.4 Memory Media ............................................................................................................... 9
5.1.5 Configuration Port .......................................................................................................... 9
5.1.6 Software and Firmware Updates ................................................................................... 9
5.2 Computers and Access ....................................................................................................... 9
5.2.1 Operating Software ........................................................................................................ 9
5.2.2 Virus Protection ............................................................................................................. 9
5.2.3 Files and Media ............................................................................................................. 9
5.2.4 User Access and Passwords ....................................................................................... 10
5.3 Networks, Firewalls & VPN connections ........................................................................... 10
5.3.1 Physical Access ........................................................................................................... 10
5.3.2 Firewall and DMZ ......................................................................................................... 10
5.3.3 Internet and VPN ......................................................................................................... 10
6 Glossary ......................................................................................................................................... 11
6.1 Abbreviations .................................................................................................................... 11

Other manuals for Honeywell touchpoint Pro

Related product manuals