Table Of Contents; Contents - Honeywell Touchpoint Pro Security Manual

Hide thumbs Also See for Touchpoint Pro:
Table of Contents

Advertisement

1 Contents

1
Contents ........................................................................................................................................... 4
2
Introduction ..................................................................................................................................... 5
2.1
Scope .................................................................................................................................. 5
2.2
Assumptions and pre-requisites .......................................................................................... 5
2.3
Related documents ............................................................................................................. 5
2.4
Security Controls ................................................................................................................. 5
2.4.1
Additional User Controls ................................................................................................ 5
2.4.2
Further Information ........................................................................................................ 5
3
IT System Architecture ................................................................................................................... 6
3.1
Ethernet Remote Connections ............................................................................................ 6
3.2
Physical and Local connections .......................................................................................... 6
4
Threats ............................................................................................................................................. 7
4.1
Unauthorised access .......................................................................................................... 7
4.2
Communications snooping .................................................................................................. 7
4.3
Viruses and other malicious software agents ...................................................................... 7
5
Mitigation Strategies ....................................................................................................................... 8
5.1
Touchpoint Pro System ....................................................................................................... 8
5.1.1
Monitor System Access ................................................................................................. 8
5.1.2
User Access and Passwords ......................................................................................... 8
5.1.3
Software and Unusual Operation ................................................................................... 9
5.1.4
Memory Media ............................................................................................................... 9
5.1.5
Configuration Port .......................................................................................................... 9
5.1.6
Software and Firmware Updates ................................................................................... 9
5.2
Computers and Access ....................................................................................................... 9
5.2.1
Operating Software ........................................................................................................ 9
5.2.2
Virus Protection ............................................................................................................. 9
5.2.3
Files and Media ............................................................................................................. 9
5.2.4
User Access and Passwords ....................................................................................... 10
5.3
Networks, Firewalls & VPN connections ........................................................................... 10
5.3.1
Physical Access ........................................................................................................... 10
5.3.2
Firewall and DMZ ......................................................................................................... 10
5.3.3
Internet and VPN ......................................................................................................... 10
6
Glossary ......................................................................................................................................... 11
6.1
Abbreviations .................................................................................................................... 11
Pt. No. 2400M2567_1
CONTENTS
4
Touchpoint Pro
Security Guide

Advertisement

Table of Contents
loading

Table of Contents