Time
2 hours 52 minutes
Difficulty
Intermediate
CEU/CPE
3

Video Transcription

00:01
welcome back to printing Security Intermediate Course. And in this video, I'm going to do short recap for what I have been talking about in the past couple videos in a module called Printing Device Essentials.
00:16
So, um, things you have learned in this module are,
00:20
uh, what means having a printing device in your network in a current market offering.
00:30
So if you're having a network printer and I'm not talking about cheap network printers that you can buy from home, I'm talking about, ah, devices men for companies and corporations.
00:41
So machines that can print 30 50 7100 pages per minute, whether they're black and white or color
00:49
and these devices are still used. Although the print volume total print volume in the world is declining,
00:59
no, it is still substantial. People still need to print for legal reasons, for ah,
01:04
you know, for example, people like me, which are 50 have a hard time reading from screen. It's much easier for us to read from a printed paper and stuff like that. So
01:15
you have a printer in your network
01:18
and you are now in a position to be open security toe, have security with vulnerability. Why? Because this print device
01:27
has evolved in past 15 20 years from just printing device. That prince
01:34
do something that is actually a PC that prints and this is a fundamental difference.
01:41
And, uh, that is what means having a printer in your network today you have a computing capable device on your network that is still by many perceived as
01:53
and the wise that is only there to print
01:57
while it's not. So
01:57
this is one thing that I have been talking about. The second thing is, what are the essentials of print devices? Architectures. So what are the parts of printing device? What are the
02:07
components in terms of her hardware and software?
02:14
And then we moved to
02:15
what can infected or compromise printing the wise due to your company
02:25
and insolence.
02:27
Um, some of the things these things are simple to do in terms off knowledge needed to compromise the printing device. Some of these things you can find the line,
02:38
but for most of these things, that damage is not substantial. It can only refer toa printing something that's not supposed to print or altering something's on the printing device.
02:51
And, um,
02:53
as the potential damage rises. It also requires more and more knowledge in terms off how to manipulate. Manipulate the printing device. So if you want to do something really bad, for example, to do the network sniffing or male sniffing from a printing device on the network,
03:12
you need to know how to write
03:15
uh, plugging or application for that printing device,
03:20
Uh, and then to find the way to deploy that
03:24
the application or something to do with buyers of the device a firmer in order to make that the wise work like that. So this is not just like writing an application for Android phone or PC
03:40
or ah, Apple PC because it's
03:46
it's specific knowledge related to that product or to do that vendor.
03:51
And it's not so simple. So basically, the knowledge is not out there. You have to dig for it. But if you are willing to do that, you can do very, very nasty things.
04:02
And in the end, I was talking about differences between printers and peas,
04:06
which is a short little from a security standpoint, which means that because of him, if peace have scanner,
04:13
um, and they are designed to when most of the cases saved the scan file somewhere on the network. So that means that they can access network locations like server locations or shared files on user BC's
04:27
and, uh, from that moment, that makes them even more dangerous, something in terms of security.
04:35
So this is what I have been talking about in this particular model in past couple off lessons.

Up Next

Intermediate Printing Security

The Intermediate Printing Security course is intended for IT and cybersecurity professionals that want to learn how to secure print devices.

Instructed By

Instructor Profile Image
Milan Cetic
IT Security Consultant
Instructor