HP M5035x HP LaserJet MFP and Color MFP Products - Configuring Security for Mu - Page 8
Threat Model
UPC - 882780574830
View all HP M5035x manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 8 highlights
Chapter 2: Threat Model This section explains the types of security risks involved with operating MFPs in enterprise environments. As technology improves, malicious people (hackers) continue to find new ways to exploit networks. They are beginning to target MFPs and other network peripherals to misuse resources or to gain access to networks or the internet. Predicting the actions of a hacker is difficult, but HP is dedicated to research in this area. This checklist represents some of HP's efforts to ensure that you can use HP MFPs with confidence; however, you should continue to be ware and always remain vigilant. Use other techniques with this checklist to help ensure that your network is resistant to compromise. NOTE: This is not a comprehensive treatment of these issues. This chapter is only an introduction to the types of threats known to affect network MFPs. The Microsoft STRIDE model provides a valuable outline to categorize these known types of threats: • Spoofing identity • Tampering with data • Repudiation • Information disclosure • Denial of service • Elevation of privilege The following sections explain how each type of threat relates to MFPs: Spoofing Identity Spoofing identity is masquerading as someone else to fool others or to get unauthorized access. Here are some ways spoofing identity can relate to MFPs: • Placing another person's email address in the From address field of an email message. Example: Someone could place the address of a co-worker in the From address field and send embarrassing or malicious messages to others as though the co-worker wrote them. • Using another person's email credentials to log in to the email server to gain access to address books • Using another person's email credentials to have free use of an email service • Using another person's email credentials to view that person's email messages • Using another person's log on credentials for access to use MFPs or networks • Using another person's log on credentials for administrative access to MFPs You can minimize the risks from identity spoofing in the following ways: • Protect the from address field in the MFP Digital Sending and Fax configurations. • Protect MFP disc access. HP LaserJet and Color LaserJet MFP Security Checklist 8