Panasonic KAIROS Operating Manual page 3

It/ip centric live video processing platform
Table of Contents

Advertisement

Network security
As the KAIROS system intended to be used while connected to a network, the following security risks
exist.
① Leakage or theft of information through the system
② Unauthorized operation of the system by persons with malicious intent
③ Interference with or stoppage of the system by persons with malicious intent
It is your responsibility to take precautions, such as those described below, to protect yourself against
the above network security risks.
Panasonic does not accept any responsibility for damage of this type.
・ Use the system in a network secured by a firewall, etc.
・ Make sure that the system is not infected by computer viruses or other malicious programs (using
a regularly updated antivirus program, anti-spyware program, etc.).
・ Protect your network against unauthorized access by restricting users to those who log in with an
authorized user name and password.
・ After accessing the system as an administrator, be sure to close all web browsers.
・ Change the administrator password periodically.
・ To avoid passwords that can be guessed easily by third parties, set a password of at least 8
characters in length, including at least 3 different types of characters, such as upper case, lower
case, numbers, and symbols.
・ Restrict access to the system by authenticating the users, for example, to prevent setting information
stored on the system from leaking over the network.
・ Do not install the system in locations where the system, cables, and other parts can be easily
damaged or destroyed by persons with malicious intent.
・ Avoid connections that use public lines.
・ The staff of our company and our affiliated companies will never ask for the password directly from
the customer.
Note:
Notes on user authentication
・ User authentication on the system can be performed via basic authentication. If basic authentication
is used without the use of a dedicated authentication device, password leaks may occur.
Usage restrictions
・ We recommend connecting the system, controller, and any computes to the same network segment.
Events based on settings inherent to the network devices, for example, may occur in connections
that include different segments, so be sure to perform checks prior to operation.
3

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents