Lenovo LEGION Y9000p
From Wiki-IoT
Revision as of 12:08, 25 October 2024 by Yifan An (talk | contribs) (Created page with "{{Classification |name=Lenovo LEGION Y9000p |brand=Lenovo |parent_company=LEGION |website=https://activity.lenovo.com.cn/ |release_date=2022-02-28 |generation=7 |model=Y9000p...")
Classification
| Lenovo LEGION Y9000p | |
|---|---|
| Classification | |
| Grade | A |
| Calculator version | [[:Category:Calculator v|]] |
| Classification date | |
| Information | |
| Name | Lenovo LEGION Y9000p |
| Brand by Parent | Lenovo by LEGION |
| Generation | 7 |
| Model(s) | Y9000p |
| Release date | 2022-02-28 |
| Type/Category | computer |
| Website | [1] |
| Status | In sale |
| More | |
| Dimensions | 16inch |
| Mass | 2.45kg |
| Operating system | Window7 |
| Companion App | Microsoft Edge |
| CPU | i7 12700H |
| GPU | RTX 3060 |
| Memory | 32GB |
| Storage | 512 GB/1024GB |
| Battery | 80Wh |
| Power | 300W |
| Charging | Fast charging |
| Display | 16inch 3200x1440ixels,165Hz refresh rate |
| Camera | 100w |
| Sound | Symmetrical dual speakers |
| Connectivity | 2.4G/5G |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | None | [2] | |
| Known vulnerabilities | None | [3] | |
| Prior attacks | None | [4] | |
| Updatability | Very common | [5] | |
| Category score | 1 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | Full | [6] | supports Authentication with other systems |
| Communications | Encrypted with obselete encryption | [7] | supports Communications |
| Storage | Encrypted with up-to-date encryption | [8] | Supports full disk encryption |
| Category score | 2 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Full | [9] | Comprehensive account settings available |
| Authentication | Secure | [10] | Supports biometric and secure PIN options |
| Brute-force protection | Exist | [11] | Includes lockout mechanisms after failed attempts |
| Event logging | Access event logged | [12] | Logs access events for security monitoring |
| Passwords | Require change after setup with complexity requirements | [13] | Enforces strong password policies |
| Category score | 1 | ||
| Grade | A |
|---|