Table Of Contents - Honeywell dolphin 70e black Network And Security Manual

Bluetooth, camera, 2d imager scanner
Hide thumbs Also See for dolphin 70e black:
Table of Contents

Advertisement

Table of Contents

Intended Audience ...............................................................................................................1-1
How to Use this Guide .........................................................................................................1-1
Product Detail ......................................................................................................................1-1
System Architecture .............................................................................................................1-1
Architecture of an In-Premise Dolphin 70e Black System..............................................1-2
Architecture of a Field Service Dolphin 70e Black System ............................................1-2
Related Documents ............................................................................................................1-3
Infection by Viruses and Other Malicious Software Agents .................................................2-1
Mitigation Steps..............................................................................................................2-1
Unauthorized External Access .............................................................................................2-1
Mitigation Steps..............................................................................................................2-1
Unauthorized Internal Access ..............................................................................................2-2
Mitigation Steps..............................................................................................................2-2
Forming a Security Team.....................................................................................................3-1
Identifying Assets to be Secured .........................................................................................3-1
Identifying and Evaluating Threats.......................................................................................3-1
Identifying and Evaluating Vulnerabilities ............................................................................3-1
Identifying and Evaluating Privacy Issues............................................................................3-2
Creating a Mitigation Plan ....................................................................................................3-2
Implementing Change Management ....................................................................................3-2
Planning Ongoing Maintenance ...........................................................................................3-2
Additional Security Resources ............................................................................................3-2
Honeywell Backup and Restore Power Tool Utility ..............................................................4-1
Accessing the Backup and Restore Power Tools ..........................................................4-1
External Storage ..................................................................................................................4-1
Remote MasterMind Device Management Software............................................................4-1
Disaster Recover Testing.....................................................................................................4-1
Honeywell SysInfo Power Tool ............................................................................................5-1
To View System Information ..........................................................................................5-1
Connecting to the Business Network ...................................................................................6-1
Third Party Applications .......................................................................................................6-1
iii

Advertisement

Table of Contents
loading

Table of Contents