Вы находитесь на странице: 1из 4

Running head: Network Peripherals: The Machines Are Not Loyal 1

Network Peripherals:

These machines can be hacked since attackers know that each time the machine is used an

image or crumbs of data are left behind on the systems hard drive. Attackers also know that

when these devices are used to scan and send files the user also send unprotected files across

the network. These multifunction devices are just as much at risk as PCs are. Without a doubt
Network Peripherals: The Machines Are Not Loyal 2

documents have evolved immensely over the years, becoming much more than just a regular

8.5 x 11 piece of paper. Do to this evolution the requirements for protecting documents

from attackers have also evolved. For example, technology can be embedded in paper

documents to provide innovative security as documents 'roundtrip' between the digital and

analog worlds (Drab). These technological advances help monitor and track who is

accessing specific documents to extent, as well as machine readable security labels can help

and remain undetected to the human eye. The best form of security monitoring to all

multifunction devices is to use a process called event correlation.

Drab, David F. "New Books." Protecting Your Information Assets from the Inside Out: The

Growing Threat from Networked Peripherals. N.p., n.d. Web. 01 May 2017.

Decreasing the amount of information an attacker can access from these devices can go a

long way towards securing them. A good first step would be to disable all protocols on these

devices other than TCP/IP. The second step, should be disabling any network services that

are not being used. These typically consists of communication protocols (print, fax and

scanning services) or protocols for management. Basically, assess each protocol and the risks

it can bring with it. Once those are identified the decision must be made whether or not to

accept that risk. If the risk is not worth it then disable them. Third, consider using an assigned

static IP address to the multifunction device. Finally, any remaining protocol that is available

should be locked down with minimum number of hosts or subnets that require access. The

fewer the hosts or subnets the fewer the chances of attacks. Many multifunction devices offer

security features by having add on security kits. Through the use of these security kits the

business can set the device to do a secure-erase between jobs which while lower the amount

of information which is on the device. This not only ensures that jobs are no longer there if
Network Peripherals: The Machines Are Not Loyal 3

someone remotely accesses the devices file system through FTP, HTTP, or a tool like

HiJetter, but also keeps the jobs from being found if the MFD goes off-site

Scott, Charles H., Jr. "Auditing and Securing Multifunction Devices." SANS Institute 2007,

25 Jan. 2007. Web. 1 May 2017.

The reality of the matter is that the EMS framework won't generally do things the way we

right now do them. In any case, is the way we show improvement over the way that depends

on the experience of many makers? We are continually rolling out improvements by the way

we get things done, so it won't be troublesome for us to roll out a few improvements to fit in

with this new programming. I expect that these progressions will enhance our operations. So

that we can say if we can build up the new software into the organization then there is no

need to purchase the software from another company

Cahners Publishing Company. (1990). Datamation, Volume 36, Issues 1-8. Cahners

Publishing Company.

Consistently, BMC has gotten a handle on the use of PCs, PC development as well as

programming to overhaul their high ground and customer associations. They have included

CAD/CAM limits, a homegrown booking spreadsheet as well as cash related applications. A

Commercial off the Shelf (COTS) booking group was procured in nineteen eighty nine in

which as it may, the execution was unsuccessful. Another COTS booking structures were

obtained in nineteen ninety one in any case, afresh, the item did not arrange the necessities of

BMC

Scenario Summary. (n.d.). A Make-or-Buy Decision at Baxter Manufacturing Company.

Scenario Summary.
Network Peripherals: The Machines Are Not Loyal 4

There are various advantages that virtualization provides to a company. Among these

advantages are Better use of existing hardware, reduction of new hardware cost, reduction in

IT infrastructure costs, simplified systems administration and simplified installation and

deployment. Another thing that virtualization has to offer to any company would be the

reduction of power consumption. According to a McKinsey report, Electricity represents

about 2540 percent of the operational expenditures for a typical datacenter. Gartner

estimates that, on average, 4060 percent of server rack space is underutilized or wasted, and

up to 30 percent of available power is stranded, which can lead to organizations outgrowing

datacenters prematurely

Deka, G. C. (2014). Cost-Benefit Analysis of Datacenter Consolidation Using Virtualization.

IT Professional, 16(6), 54-62. doi:10.1109/MITP.2014.89

Вам также может понравиться