Jump to content

TG42

Members
  • Posts

    1
  • Joined

  • Last visited

TG42's Achievements

Newbie

Newbie (1/4)

0

Reputation

  1. For reusing the parts named in the headline after a cyber attack, our IT requests answers to all of the following questions: 1. Is write access to the devices memory possible by using external interface ports or network connections (for example USB or Ethernet)? 2. When using these connection methods can any data be written to the device to any kind of non volatile memory (ROM, EEPROM) so it will be available after shut down? 3. Is it somehow protected that only special kind of data is written or stored by e.g. using a special tool / format / key? 4. Can the device be set to factory settings by SEMIKRON (all memory areas to factory settings)? 5. Can the device be set to factory settings if we send it back to you (all memory areas to factory settings)? 6. Is there a general possibility for a virus to download its code to the device? Thank you very much.
×
×
  • Create New...