NiagaraAX security considerations

Any host connected to the Internet is vulnerable to attacks by someone else in the Internet community. This is especially true of any host that stays connected to the Internet virtually full time. NiagaraAX hosts that may be vulnerable include:

Typically, Win32-based hosts are more vulnerable than QNX-based hosts. This is a function of two factors:

Another common point of attack for Internet hosts is the web server that runs on many Internet hosts (including NiagaraAX hosts). However, the NiagaraAX web server implementation is proprietary and not subject to the well-advertised attacks on Microsoft Internet Information Server and the Apache HTTP Server.

The following security suggestions are provided to help you secure NiagaraAX hosts when connecting them to the Internet. You should evaluate the suggestions to see if they are applicable for each job that you architect.

Note: Many of these suggestions are also good guidelines for connecting hosts even in a LAN/WAN or direct-dial environment. Anyone with physical (or network) access to a host can be considered a security threat. You may want to consider implementing some of these, regardless of Internet connectivity.