Epson EX5250 Pro User Manual - Page 57

Wireless Network Security Guidelines, Installing the Wireless LAN Module

Page 57 highlights

Wireless Network Security Guidelines A wireless network allows the exchange of information using radio signals, so you can easily connect to the network if you are within range of the radio signals. However, within a certain range, the signals can reach unintended recipients. Security experts recommend password protected wireless networks. Check with your network administrator for guidance on setting up wireless security for your network. If wireless security countermeasures are not implemented, problems such as the following may occur: • Communicated data could be intercepted by a third party who is receiving wireless transmissions without authorization, and who could obtain personal information from these transmissions such as IDs, passwords, credit card numbers, or the contents of personal e-mail messages. • Unauthorized access to a network by a third party could result in access to an individual or intracompany network without permission, allowing them to do any of the following: • Retrieve personal data or other secret information (information leakage) • Pose as another user and send inappropriate data (impersonation) • Overwrite the contents of intercepted data and resend it (falsification) • Introduce a computer virus which could cause data loss or system crashes (damage) Parent topic: Wireless Network Projection Installing the Wireless LAN Module To use the projector over a wireless network, install the Epson 802.11b/g/n wireless LAN module in the projector. Do not install any other type of wireless module. Note: Your product may look different from the illustrations in this guide, but the instructions are the same. 57

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249

Wireless Network Security Guidelines
A wireless network allows the exchange of information using radio signals, so you can easily connect to
the network if you are within range of the radio signals. However, within a certain range, the signals can
reach unintended recipients.
Security experts recommend password protected wireless networks. Check with your network
administrator for guidance on setting up wireless security for your network.
If wireless security countermeasures are not implemented, problems such as the following may occur:
• Communicated data could be intercepted by a third party who is receiving wireless transmissions
without authorization, and who could obtain personal information from these transmissions such as
IDs, passwords, credit card numbers, or the contents of personal e-mail messages.
• Unauthorized access to a network by a third party could result in access to an individual or intra-
company network without permission, allowing them to do any of the following:
• Retrieve personal data or other secret information (information leakage)
• Pose as another user and send inappropriate data (impersonation)
• Overwrite the contents of intercepted data and resend it (falsification)
• Introduce a computer virus which could cause data loss or system crashes (damage)
Parent topic:
Wireless Network Projection
Installing the Wireless LAN Module
To use the projector over a wireless network, install the Epson 802.11b/g/n wireless LAN module in the
projector. Do not install any other type of wireless module.
Note:
Your product may look different from the illustrations in this guide, but the instructions are the
same.
57