Xerox 6180N Generic MICR Fundamentals Guide  - Page 132

Responsible presence, Software security, Logon levels, Memory

Page 132 highlights

Security Responsible presence The key to security in any document generation process is an individual or group that is responsible for safeguarding the printing process. For critical applications, the auditing operation has this responsibility. In small organizations, the printer operator may be responsible for security. You can create a higher security level by combining physical security with a responsible individual or group when the system and supplies are not secured. Thus, two persons can have responsibility for the printing facility, by either dual key access to the media or knowing a password to access the data files and run the print job. Software security Software security focuses on restricting access to key files to authorized individuals. Many software features provide different levels of protection, from class level logon control to automatic deletion of files at completion of a print job. NOTE: Internal audit features vary depending on the printer and controller configuration. You must consider your equipment capabilities when assessing your auditing needs. Refer to your printer customer documentation for information on the security and auditing features that are available to you, and the processes for enabling them. Logon levels Several Xerox MICR printers provide some level of logon or password security as standard or an option. Many systems have a logon level at which the user files can be restricted from all of the other levels so they cannot be edited, deleted, or used by other jobs. Memory Fonts, logos, graphics, and other resource files may need to be restricted from other users. Even if these resources are adequately protected, unauthorized access could be obtained through the residual contents of font memory or disk storage. 8-4 Generic MICR Fundamentals Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172

Security
8-4
Generic MICR Fundamentals Guide
Responsible presence
The key to security in any document generation process is an
individual or group that is responsible for safeguarding the
printing process. For critical applications, the auditing operation
has this responsibility. In small organizations, the printer operator
may be responsible for security.
You can create a higher security level by combining physical
security with a responsible individual or group when the system
and supplies are not secured. Thus, two persons can have
responsibility for the printing facility, by either dual key access to
the media or knowing a password to access the data files and
run the print job.
Software security
Software security focuses on restricting access to key files to
authorized individuals.
Many software features provide different levels of protection,
from class level logon control to automatic deletion of files at
completion of a print job.
NOTE:
Internal audit features vary depending on the printer and
controller configuration. You must consider your equipment
capabilities when assessing your auditing needs. Refer to your
printer customer documentation for information on the security
and auditing features that are available to you, and the
processes for enabling them.
Logon levels
Several Xerox MICR printers provide some level of logon or
password security as standard or an option. Many systems have
a logon level at which the user files can be restricted from all of
the other levels so they cannot be edited, deleted, or used by
other jobs.
Memory
Fonts, logos, graphics, and other resource files may need to be
restricted from other users. Even if these resources are
adequately protected, unauthorized access could be obtained
through the residual contents of font memory or disk storage.