Canon PowerShot ELPH 320 HS Getting Started Guide - Page 47

Security Precautions, Third parties with malicious intent may monitor wireless LAN

Page 47 highlights

• Be sure to use the product as directed in this guide. Be sure to use the wireless LAN function of this product within the guidelines noted in this guide. Canon accepts no responsibility for damages or loss even if the function and product are used in ways other than as described in this guide. • Do not use the wireless LAN function of this product near medical equipment or other electronic equipment. Use of the wireless LAN function near medical equipment or other electronic equipment may affect operation of those devices. Security Precautions Since wireless LAN uses radio waves to transmit signals, tighter security precautions are necessary than when using a LAN cable. When using wireless LAN, keep the following points in mind. • Only use networks you are authorized to use. This product searches for wireless LAN networks in the vicinity and displays the results on the screen. Networks you are not authorized to use (unknown networks) may also be displayed. However, connecting to or attempting to use those networks could be regarded as unauthorized access. Be sure to use only networks you are authorized to use, and do not attempt to connect to other unknown networks. If security settings have not been properly set, the following problems may occur. • Transmission monitoring Third parties with malicious intent may monitor wireless LAN transmissions and attempt to acquire the data you are sending. • Unauthorized network access Third parties with malicious intent may gain unauthorized access to the network you are using and steal, modify, or destroy information. Additionally, you could fall victim to other types of unauthorized access such as impersonation (where someone assumes an identity to gain access to unauthorized information) and springboard attacks (where someone gains unauthorized access to your network as a springboard to cover their tracks when infiltrating other systems). w-7

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100

w-7
Be sure to use the product as directed in this guide.
Be sure to use the wireless LAN function of this product within the
guidelines noted in this guide. Canon accepts no responsibility for
damages or loss even if the function and product are used in ways other
than as described in this guide.
Do not use the wireless LAN function of this product near medical
equipment or other electronic equipment.
Use of the wireless LAN function near medical equipment or other
electronic equipment may affect operation of those devices.
Security Precautions
Since wireless LAN uses radio waves to transmit signals, tighter security
precautions are necessary than when using a LAN cable.
When using wireless LAN, keep the following points in mind.
Only use networks you are authorized to use.
This product searches for wireless LAN networks in the vicinity and
displays the results on the screen. Networks you are not authorized to
use (unknown networks) may also be displayed. However, connecting to
or attempting to use those networks could be regarded as unauthorized
access. Be sure to use only networks you are authorized to use, and do
not attempt to connect to other unknown networks.
If security settings have not been properly set, the following problems may
occur.
Transmission monitoring
Third parties with malicious intent may monitor wireless LAN
transmissions and attempt to acquire the data you are sending.
Unauthorized network access
Third parties with malicious intent may gain unauthorized access to
the network you are using and steal, modify, or destroy information.
Additionally, you could fall victim to other types of unauthorized access
such as impersonation (where someone assumes an identity to gain
access to unauthorized information) and springboard attacks (where
someone gains unauthorized access to your network as a springboard to
cover their tracks when infiltrating other systems).