Canon imageRUNNER Security Kit 브로셔
I
Introduction to Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
I
Canon Goals of Information Security . . . . . . . . . . . . . . . . . 3
I
Government Legislation. . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
I
Key Categories for Device, Network and
Document Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Document Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
I
Canon Security Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . 6
I
System Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
I
Canon HDD and RAM Data Protection . . . . . . . . . . . . . . . . 9
I
User Authentication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
I
Network Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
I
Document Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
I
Fax Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
I
Logging/Auditing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
I
Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
The information contained in this document pertains to
Canon’s imageCHIP architected devices, known as the
imageRUNNER
Canon’s imageCHIP architected devices, known as the
imageRUNNER
®
line of digital multifunctional products. The
information in this document is exclusive of imageRUNNER
devices capable of speeds of 20 ppm and below.
devices capable of speeds of 20 ppm and below.
2
010101010101010101010101010101
010101010101001010101010101010