2 hours 52 minutes
welcome back to printing Security Intermediate Course. And in this video, I'm going to do short recap for what I have been talking about in the past couple videos in a module called Printing Device Essentials.
So, um, things you have learned in this module are,
uh, what means having a printing device in your network in a current market offering.
So if you're having a network printer and I'm not talking about cheap network printers that you can buy from home, I'm talking about, ah, devices men for companies and corporations.
So machines that can print 30 50 7100 pages per minute, whether they're black and white or color
and these devices are still used. Although the print volume total print volume in the world is declining,
no, it is still substantial. People still need to print for legal reasons, for ah,
you know, for example, people like me, which are 50 have a hard time reading from screen. It's much easier for us to read from a printed paper and stuff like that. So
you have a printer in your network
and you are now in a position to be open security toe, have security with vulnerability. Why? Because this print device
has evolved in past 15 20 years from just printing device. That prince
do something that is actually a PC that prints and this is a fundamental difference.
And, uh, that is what means having a printer in your network today you have a computing capable device on your network that is still by many perceived as
and the wise that is only there to print
while it's not. So
this is one thing that I have been talking about. The second thing is, what are the essentials of print devices? Architectures. So what are the parts of printing device? What are the
components in terms of her hardware and software?
And then we moved to
what can infected or compromise printing the wise due to your company
Um, some of the things these things are simple to do in terms off knowledge needed to compromise the printing device. Some of these things you can find the line,
but for most of these things, that damage is not substantial. It can only refer toa printing something that's not supposed to print or altering something's on the printing device.
as the potential damage rises. It also requires more and more knowledge in terms off how to manipulate. Manipulate the printing device. So if you want to do something really bad, for example, to do the network sniffing or male sniffing from a printing device on the network,
you need to know how to write
uh, plugging or application for that printing device,
Uh, and then to find the way to deploy that
the application or something to do with buyers of the device a firmer in order to make that the wise work like that. So this is not just like writing an application for Android phone or PC
or ah, Apple PC because it's
it's specific knowledge related to that product or to do that vendor.
And it's not so simple. So basically, the knowledge is not out there. You have to dig for it. But if you are willing to do that, you can do very, very nasty things.
And in the end, I was talking about differences between printers and peas,
which is a short little from a security standpoint, which means that because of him, if peace have scanner,
um, and they are designed to when most of the cases saved the scan file somewhere on the network. So that means that they can access network locations like server locations or shared files on user BC's
and, uh, from that moment, that makes them even more dangerous, something in terms of security.
So this is what I have been talking about in this particular model in past couple off lessons.
The OWASP Online test is a premium Cybrary assessment test created by iMocha. It is ...
The Six Sigma Test is a premium Cybrary assessment created by iMocha. This exam assesses ...