FAQ

Common FAQ
Technical FAQ
Tracksolid FAQ
NIST8259 FAQ
Does the hardware, firmware, or software (including the operating system) include unneeded device capabilities with cybersecurity implications? If so, can they be disabled to prevent misuse and exploitation?

The source code is compiled and burned to the device; source code is not involved during the use of the device. The debug interface has been closed, and unauthorized users cannot access it. JIMI developers use Git to control source code of the device, and it implement session control, access control, all these functions can protect device code from unauthorized access and tampering.

How is IoT device code protected from unauthorized access and tampering?

The source code is compiled and burned to the device; source code is not involved during the use of the device. The debug interface has been closed, and the unauthorized users cannot access it. Jimi developers use Git to control source code of the device, and it implement session control, access control, all these functions can protect device code from unauthorized access and tampering.

What processes are in place to assess and prioritize the remediation of all vulnerabilities in IoT device software?

JimiIoT security team will evaluate the severity of all collected vulnerabilities, and determine the processing priority level based on the risk assessment results of the vulnerabilities in the product, and response to and repair the vulnerabilities in a timely manner according to the priority level to prevent the vulnerability from being maliciously exploited and affecting users.

LIÊN KẾT THÂN THIỆN