Page 1
Security Guide Touchpoint Pro AN0989_Iss 1 Touchpoint Pro Pt. No. 2400M2563_1_EN Webserver User Guide...
Page 2
Revision History Revision Comment Date Issue 01 A04815 Nov 2016 Touchpoint Pro Pt. No. 2400M2567_1 Security Guide...
Page 3
LEGAL NOTICES Disclaimer In no event shall Honeywell be liable for any damages or injury of any nature or kind, no matter how caused, that arise from the use of the equipment referred to in this manual. Strict compliance with the safety procedures set out and referred to in this manual, and extreme care in the use of the equipment, are essential to avoid or minimise the chance of personal injury or damage to the equipment.
It provides information supporting identification and mitigation of security risks associated with the day to day use of the system in connected IT infrastructures 2.1 Scope This document applies to Touchpoint Pro systems in a networked environment, associated computers, and data storage media. 2.2 Assumptions and pre-requisites This guide assumes a high degree of technical knowledge and familiarity with: •...
IT ARCHITECTURE 3 IT System Architecture Touchpoint Pro may be configured in a variety of network topologies, from simple peer to peer or isolated LAN to a corporate network with internet access. This guide is primarily concerned with systems connected to a WAN or corporate network with possible Internet access.
The capture, modification, or deletion of data, including configuration data and device logs Viruses can be transmitted by media such as USB memory devices and SD cards, from other infected systems on the network, and from infected or malicious Internet sites. Touchpoint Pro Pt. No. 2400M2567_1 Security Guide...
5.1.2 User Access and Passwords Touchpoint Pro has three levels of user. Users at each level have unique usernames and passwords. Observe the following good practice: Ensure physical security of passwords. Avoid writing user names and passwords where they can be seen by unauthorised personnel.
5.1.3 Software and Unusual Operation Touchpoint Pro isolates the gas detection system from the user interface. If unusual operation is observed on the user interface, the following measures may be taken: Restart the user interface to reload the software. This will not interrupt operation of the gas detection system,...
5.3.3 Internet and VPN Where access from untrusted networks is required, such as internet access, a VPN must be used to ensure the security of the connection. Touchpoint Pro Pt. No. 2400M2567_1 Security Guide...
De-Militarized Zone, used to restrict access from parts of a network https Hypertext Transfer Protocol secure version Local Area Network Personal Computer Secure Digital memory card TPPR Touchpoint Pro gas detection system Universal Serial Bus memory devices Virtual Private Network Touchpoint Pro Pt. No. 2400M2567_1 Security Guide...