Difference Between Printers and MFPs
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
Already have an account? Sign In »
2 hours 52 minutes
welcome back to printing Security Intermediate Course. And in this video, I will be talking about what is the difference between printer and, um, I M F B and M Fe's shortcut for multi function printer are multi function printing device,
and I'm going to talk about little about security impact of these differences. So this is going to be very simple explanation,
and the main reason is that I M f B has a scanner here. You can see two devices when his printer one is MFP, and they're based on the same printing hardware. So basically, the lower part of disease almost identical. Actually, it is.
And what is different is the electron ICS part of the rendering board, or for matter like it's called in this device on
between them. Because the form attar in the
the MFP can process scanning scanned images, it can do copying and things that printer simply cannot do because they don't have Skinner.
So I M F B usually has more memory than printer because it has to handle much more data because printer has to handle print job coming in and print it
while I'm FB has to, For examples can
50 or 100 pages off, scanned, document and sanded somewhere on the create a Pdf file and send it on the server.
So he has to have enough memory to store something like that.
Um, it usually has greater non volatile storage. So, for example, hard driving in them. If peace is usually greater than 50
and it usually has faster process. Everybody doesn't have to be the case, so I'm just saying it's usually
and usually it's same firmer or operating system like a willing printer. So if you're having these two devices, they have
pretty much the same always inside.
But what is the fundamental difference from security perspective on the and B compared to a printer, it has additional function so it can scan to let folder
and because it's on a network, and if
this network folders, for example, on the server,
then that you have to store user name and password
that is needed to access that folder on the server inside the device. So you're storing them inside there.
So first of all, you're storing some kind of passport for network
dr or something.
It can also scan to email.
So in these cases, you are
probably assigning user name or email address to that device
and then giving that device user name and password to access the email
server. However, you can do that also as well, in a way that every user of the device can type in or in some other way, produce their email address and password. In which case, if somebody sniffing on the device they can collect, for example, use names and passwords of people working in the company,
which can then be used to,
attack these PC's Because these are the same
it can scan to folder. As I said, any kids can't work for, which is basically skins to some kind of third parties after that will then do something with it. So this third part is not such a big thing. But these 1st 2 scanning to email is coming to folder, are additional security or is compared to a printer
and also ah, and because of that time of peace and princess have different level of risk checked attached,
as they said, the manufacturer uses probably the same mother board or form a tear or rendering Borden all devices
eso. This is not the difference in kind of risk. It is usually
same operating system and firmer. But
what I'm a piece do on a daily basis is they can pray. Pdf's J pegs,
and it can be embedded with delicious coat,
so this is additional risk level off having enough be
and then if bees can be used to spoof email sender.
So, basically, if you having a device that has
ability to send to email a scan document
and if users are supposed to type in there the user name and password when they're doing it or they do it by presenting their digital badge or something. If you find a way, you can change that from email address and change it to something else. Or you can send
it through a different email address to somebody who is not supposed to receive the kind of that email.
So basically, m appease our security risk in that metro and printers or not.
So, um, let's do a quick learner check and see, uh,
what kind of attack doesn't work on a printer?
So is it just the printer, not printing device? Is it embedded Web server hacking
Is it network sniffing,
or is it? Mail it in to the spoofing, and the answer is, of course,
male identity spoofing. So this is a thing you don't do on the printer.
So you have in this lesson not the idea on what is the difference between a printer and a multi function device like multi function printer or copier that is also a printer on so on, so different. Manufacturers call these devices in a different manner with different marketing names, but
this is essentially their function, so you can
have a printing devices, just prints. Or you can have a printing device that can scan and copy and do something with these can documents and send email as well.
In this video, you have learned about the differences between printers and peas and especially the security implications of the differences. So you have seen that because I'm a freeze, they have Skinner. There are additional things that you have to worry about when they're deployed in the company network.
Also, in the next lesson, you will be able to learn about
a lot of things you have learned in this module