Identifying And Evaluating Privacy Issues; Creating A Mitigation Plan; Implementing Change Management; Planning Ongoing Maintenance - Honeywell dolphin 70e black Network And Security Manual

Bluetooth, camera, 2d imager scanner
Hide thumbs Also See for dolphin 70e black:
Table of Contents

Advertisement

Identifying and Evaluating Privacy Issues

Consider the potential for unauthorized access to personal data stored within your system. Any information considered sensitive
should be protected and all access methods should be reviewed to ensure correct authorization is required.

Creating a Mitigation Plan

Create policies and procedures to protect your assets from threats. The policies and procedures should cover your networks,
computer hardware and software, and Dolphin 70e Black equipment. You should also perform risk assessments to evaluate the
potential impact of threats. A full inventory of your assets helps identify threats and vulnerabilities. These tasks assist you in
deciding whether to ignore, mitigate, or transfer the risk.

Implementing Change Management

A formal change management procedure is vital for ensuring any modifications made to the Dolphin 70e Black network continue
to meet the same security requirements as the components included in the original asset evaluation and associated risk
assessment and mitigation plans.
A risk assessment should be performed on any change made to the Dolphin 70e Black and its infrastructure that could affect
security, including configuration changes, the addition of network components, and the installation of software. Changes to
policies and procedures might also be required.

Planning Ongoing Maintenance

Constant vigilance of your security program should involve:
• Regular monitoring of your system.
• Regular audits of your network security configuration.
• Regular security team meetings where keeping up-to-date with the latest threats and technologies for dealing with
security issues are discussed.

Additional Security Resources

Android
Android Security Overview
Android Open Source Project
Android Application Developers
Android Security Team Contact Information
Android Security FAQ for Developers
Android Security Best Practices for Developers
Android Security Community Discussion Groups
Information Security Standards
European Network and Information Security Exchange
British Standards Institution - Information Security
International Organization for Standardization (ISO)
3 - 2
http://source.android.com/devices/tech/security/index.html
https://source.android.com
https://developer.android.com
security@android.com
https://developer.android.com/resources/faq/security.html
https://developer.android.com/guide/practices/
security.html
https://groups.google.com/forum/?fromgroups#!forum/
android-security-discuss
http://www.enisa.europa.eu/
http://www.bsi-global.com
http://www.iso.org

Advertisement

Table of Contents
loading

Table of Contents