
iii
Chapter 1 - Introduction
Intended Audience ...............................................................................................................1-1
How to Use this Guide .........................................................................................................1-1
Product Detail ......................................................................................................................1-1
System Architecture.............................................................................................................1-1
Architecture of an In-Premise Dolphin 70e Black System..............................................1-2
Architecture of a Field Service Dolphin 70e Black System ............................................1-2
Related Documents ............................................................................................................1-3
Chapter 2 - Security Checklist
Infection by Viruses and Other Malicious Software Agents .................................................2-1
Mitigation Steps..............................................................................................................2-1
Unauthorized External Access.............................................................................................2-1
Mitigation Steps..............................................................................................................2-1
Unauthorized Internal Access ..............................................................................................2-2
Mitigation Steps..............................................................................................................2-2
Chapter 3 - Developing a Security Program
Forming a Security Team.....................................................................................................3-1
Identifying Assets to be Secured .........................................................................................3-1
Identifying and Evaluating Threats.......................................................................................3-1
Identifying and Evaluating Vulnerabilities ............................................................................3-1
Identifying and Evaluating Privacy Issues............................................................................3-2
Creating a Mitigation Plan....................................................................................................3-2
Implementing Change Management....................................................................................3-2
Planning Ongoing Maintenance...........................................................................................3-2
Additional Security Resources ............................................................................................3-2
Chapter 4 - Disaster Recovery Planning
Honeywell Backup and Restore Power Tool Utility..............................................................4-1
Accessing the Backup and Restore Power Tools ..........................................................4-1
External Storage ..................................................................................................................4-1
Remote MasterMind Device Management Software............................................................4-1
Disaster Recover Testing.....................................................................................................4-1
Chapter 5 - Security Updates and Service Packs
Honeywell SysInfo Power Tool ............................................................................................5-1
To View System Information ..........................................................................................5-1
Chapter 6 - Network Planning and Security
Connecting to the Business Network ...................................................................................6-1
Third Party Applications .......................................................................................................6-1
Table of Contents