Hitachi EM-G21 User Manual page 13

Table of Contents

Advertisement

Information on Functionality (Continued)
Management of site-specific information
 The Gateway can register and store information that is specific to you and your
premise. If such site-specific information leaks, your loss may be unpredictable.
Take utmost care in managing such site-specific information stored in the Gateway.
 You can completely erase the site-specific information by initializing the Gateway.
Follow the procedure in Section 8.1, "Initialization of the Gateway."
Important Information on Wireless LAN Security for Privacy
 Because wireless LAN uses radio waves instead of LAN cables for communications
among devices such as PCs through wireless LAN access points, it has the benefit
of LAN connection anywhere as far as radio waves can reach.
 Conversely, without proper security settings, wireless LAN may be susceptible to
the following threats because radio waves can reach anywhere within their scope
beyond obstacles such as walls:
 Sniffing: A malicious third party may willfully intercept radio waves, thus
stealing the content of communications such as e-mails or personal information
such as user IDs, passwords, and credit-card numbers.
 Unauthorized intrusion: A malicious third party may intrude on the personal or
corporate network without consent, and either steal personal or confidential
information (leaking), spread false information while impersonating a particular
person (spoofing), overwrite intercepted communications (tampering), or spread
malware to corrupt data and crash the system (destroying).
 Most wireless LAN adapters and wireless LAN access points are equipped with
security measures against the above-mentioned threats. By configuring the
settings of such security measures properly, the user can minimize the
susceptibility of the user's wireless LAN system to these threats.
 Some wireless LAN adapters and wireless LAN access points may ship with
security settings not configured by default. Accordingly, in order to minimize
possible threats to the user's wireless LAN system, the user is required to configure
all security settings before the user starts using wireless LAN adapters and wireless
LAN access points.
 By design, wireless LAN is still susceptible to security breach via special methods.
Use wireless LAN with this in mind.
 The Manufacturer advises the user to configure, at the user's own judgement and
responsibility, all security settings on wireless LAN devices properly before use,
based on the user's full understanding of possible threats when such settings are
not made.
 The Manufacturer disclaims any loss due to the user's failure in configuring proper
security settings on wireless LAN devices or due to security breach inevitable by
design of wireless LAN.
INFORMATION
INFORMATION
- XIII -

Advertisement

Table of Contents
loading

Table of Contents