HP Color LaserJet 4730 HP LaserJet MFP and Color MFP Products - Configuring Se - Page 8

Threat Model - email

Page 8 highlights

Chapter 2: Threat Model This section explains the types of security risks involved with operating MFPs in enterprise environments. As technology improves, malicious people (hackers) continue to find new ways to exploit networks. They are beginning to target MFPs and other network peripherals to misuse resources or to gain access to networks or the internet. Predicting the actions of a hacker is difficult, but HP is dedicated to research in this area. This checklist represents some of HP's efforts to ensure that you can use HP MFPs with confidence; however, you should continue to be ware and always remain vigilant. Use other techniques with this checklist to help ensure that your network is resistant to compromise. NOTE: This is not a comprehensive treatment of these issues. This chapter is only an introduction to the types of threats known to affect network MFPs. The Microsoft STRIDE model provides a valuable outline to categorize these known types of threats: • Spoofing identity • Tampering with data • Repudiation • Information disclosure • Denial of service • Elevation of privilege The following sections explain how each type of threat relates to MFPs: Spoofing Identity Spoofing identity is masquerading as someone else to fool others or to get unauthorized access. Here are some ways spoofing identity can relate to MFPs: • Placing another person's email address in the From address field of an email message. Example: Someone could place the address of a co-worker in the From address field and send embarrassing or malicious messages to others as though the co-worker wrote them. • Using another person's email credentials to log in to the email server to gain access to address books • Using another person's email credentials to have free use of an email service • Using another person's email credentials to view that person's email messages • Using another person's log on credentials for access to use MFPs or networks • Using another person's log on credentials for administrative access to MFPs You can minimize the risks from identity spoofing in the following ways: • Protect the from address field in the MFP Digital Sending and Fax configurations. • Protect MFP disc access. HP LaserJet and Color LaserJet MFP Security Checklist 8

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69

HP LaserJet and Color LaserJet MFP Security Checklist
8
Chapter 2:
Threat Model
This section explains the types of security risks involved with operating MFPs in enterprise
environments.
As technology improves, malicious people (hackers) continue to find new ways to exploit
networks. They are beginning to target MFPs and other network peripherals to misuse resources
or to gain access to networks or the internet. Predicting the actions of a hacker is difficult, but HP
is dedicated to research in this area. This checklist represents some of HP's efforts to ensure that
you can use HP MFPs with confidence; however, you should continue to be ware and always
remain vigilant. Use other techniques with this checklist to help ensure that your network is
resistant to compromise.
NOTE:
This is not a comprehensive treatment of these issues.
This chapter is only an introduction to the types of threats
known to affect network MFPs.
The Microsoft STRIDE model provides a valuable outline to categorize these known types of
threats:
Spoofing identity
Tampering with data
Repudiation
Information disclosure
Denial of service
Elevation of privilege
The following sections explain how each type of threat relates to MFPs:
Spoofing Identity
Spoofing identity is masquerading as someone else to fool others or to get unauthorized access.
Here are some ways spoofing identity can relate to MFPs:
Placing another person's email address in the From address field of an email message.
Example: Someone could place the address of a co-worker in the From address field and
send embarrassing or malicious messages to others as though the co-worker wrote
them.
Using another person's email credentials to log in to the email server to gain access to
address books
Using another person's email credentials to have free use of an email service
Using another person's email credentials to view that person’s email messages
Using another person's log on credentials for access to use MFPs or networks
Using another person's log on credentials for administrative access to MFPs
You can minimize the risks from identity spoofing in the following ways:
Protect the
from address
field in the MFP Digital Sending and Fax configurations.
Protect MFP disc access.