Sharp PCMM20 User Guide - Page 14

Notice of Security with Wireless Devices

Page 14 highlights

Notice of Security with Wireless Devices Wireless LAN provides data transfer by means of electric waves instead of LAN cables between communicating devices such as personal computers and a wireless LAN station. Wireless LAN has an advantage of simple and ubiquitous LAN connection in the ranges where electric waves are available. Since electric waves can penetrate through walls and reach everywhere, wireless LAN includes some security threats and can produce the situations mentioned below without proper security settings. • Eavesdropping Malicious third parties can intercept the transmission and monitor your mail to obtain personal information such as an identification number, password, and credit card number. • Intruding Malicious third parties can connect to a personal or office network without authorization and illegally perform the following: • Obtaining access to confidential customer records or sensitive corporate information (Information leakage) • Faking the original information (Spoofing) • Altering the monitored original data and transmitting (Falsification) • Spreading computer viruses resulting in the destruction of data or systems (Destruction) Although wireless LAN cards and wireless LAN stations (Access Points) have security measures against the threats above, no security settings may have been configured at the time of purchase. All security features must be configured according to reference manuals of the wireless LAN devices, which results in reduced opportunities for the situations described above. Use with a clear understanding that wireless LAN includes vulnerabilities that could allow attackers to simply bypass security features. Security measures are important for all users to understand for a safe use of wireless LAN. SHARP encourages all users to configure the security settings with their own judgment and responsibility. xiv

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146

xiv
Notice of Security with Wireless Devices
Wireless LAN provides data transfer by means of electric waves instead of LAN
cables between communicating devices such as personal computers and a wireless
LAN station. Wireless LAN has an advantage of simple and ubiquitous LAN
connection in the ranges where electric waves are available.
Since electric waves can penetrate through walls and reach everywhere, wireless
LAN includes some security threats and can produce the situations mentioned below
without proper security settings.
Eavesdropping
Malicious third parties can intercept the transmission and monitor your mail to
obtain personal information such as an identification number, password, and
credit card number.
Intruding
Malicious third parties can connect to a personal or office network without
authorization and illegally perform the following:
Obtaining access to confidential customer records or sensitive corporate
information (Information leakage)
Faking the original information (Spoofing)
Altering the monitored original data and transmitting (Falsification)
Spreading computer viruses resulting in the destruction of data or systems
(Destruction)
Although wireless LAN cards and wireless LAN stations (Access Points) have
security measures against the threats above, no security settings may have been
configured at the time of purchase.
All security features must be configured according to reference manuals of the
wireless LAN devices, which results in reduced opportunities for the situations
described above.
Use with a clear understanding that wireless LAN includes vulnerabilities that could
allow attackers to simply bypass security features.
Security measures are important for all users to understand for a safe use of wireless
LAN. SHARP encourages all users to configure the security settings with their own
judgment and responsibility.