Security Precautions - Hitachi IJ RX2-SD160 Instruction Manual

Ink jet printer for industrial marking
Table of Contents

Advertisement

SECURITY PRECAUTIONS

In the control system, the connection with the information and telecommunications system is
progressing recently, and it causes for the increased security risk such as cyber attacks.
In a system applying this product, both physical security measures mainly in the installation location
and security measures against the network usage are required.
[Security risk example via the network]
Abnormal operation, performance degradation, information leakage and data tampering by
attacks from outside
Malfunction, harm and damage occurrence due to programs and/or data tampering from
outside
It is used as an attacking step for other systems
However, the security level to be determined varies by each control system. In addition, the
assumed security risk is not fixed, it will be something to change on a daily basis.
Not only in our products, individual security protection support functions of each product configuring
the system is one means to ensure the security level required for the system, it does not completely
prevent the security risk growing day by day.
The construction of the security level required for the control systems are responsible by the system
and customer. In addition, for the maintenance of the security level will require continuous
improvement of measures.
In a system using this product, trouble, accident or damages caused by unauthorized external
access, Hitachi Group will not be able to bear any responsibility.
It is required for the customer side to clarify the target of the security protection of the system.
Then set up the typical measures as below, and build out and operate the system.
Utilization and periodic review of the authentication function for the program and the data to be
protected
Utilize the security functions of the device configuring the network
Prevention of the unspecified connection by use of the function to identify the target
connection
Measures in the operational management, such as to lock the location of devices or restrict
the operator
Please use the USB memory only on this device. Please do regularly virus check for the USB
by using a computer with the latest antiviruls software.
(8) ●Security Precautions
CAUTION

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ij rx2Ij rx2-bd160

Table of Contents