Acer Predator 17 G9-793
From Wiki-IoT
Classification
| Acer Predator 17 G9-793 | |
|---|---|
| Classification | |
| Grade | B |
| Calculator version | 1 |
| Classification date | 2022-01-30 |
| Information | |
| Name | Predator 17 |
| Brand by Parent | Acer by AMIBOT |
| Generation | Animal Comfort |
| Model(s) | 17 G9-793 |
| Release date | 2016-09-11 |
| Type/Category | Computer |
| Website | [1] |
| Status | In sale |
| More | |
| Dimensions | 423 x 322 x 40 mm (16.65" x 12.68" x 1.57") |
| Mass | 4.20 kg (9.3 lbs) |
| Operating system | Microsoft Windows 10 Famille |
| Companion App | AMIBOT HOME |
| CPU | Intel Core i7-7700HQ |
| GPU | - |
| Memory | 2x8GB DDR4, 2400 MHz |
| Storage | 500GB SSD PCIe NVMe + 1TB HDD, 7200 rpm |
| Battery | 88Wh, 6000 mAh, 8-cell |
| Power | 22 Watts |
| Charging | 5 hours, 14.4 – 14.8V |
| Display | - |
| Camera | 1280 x 720 pixels |
| Sound | Haut-parleurs (4x Speakers + Two Subwoofers) (Realtek High Definition Audio) |
| Connectivity | Killer Ethernet E2400 10/100/1000, Killer Wireless-AC 1535 802.11ac 2x2 MU-MIMO (2.4GHz / 5GHz), Bluetooth |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | None | [2] | The device has fewer reports of hardware tampering. |
| Known vulnerabilities | Rare | [3] [4] | Only a small number of vulnerabilities have been found, and Apple makes regular security updates. |
| Prior attacks | Rare | [5] [6] | No known successful attacks have been reported. |
| Updatability | Very common | [7] | Update several times per year. |
| Category score | 2 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | Partial | [8] | Supports full certification with multiple systems. |
| Communications | Encrypted with up-to-date encryption | [9] [10] [11] | Secure communications with the latest encryption technology. |
| Storage | Encrypted with up-to-date encryption | [12] [13] [14] | Encryption using BitLocker easy to setup but disabled by default. |
| Category score | 2 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Full | [15] | Provides comprehensive account management capabilities. |
| Authentication | Secure | [16] [17] | Adopt a secure authentication mechanism. |
| Brute-force protection | Basic | [18] [] | Has measures to prevent brute force cracking. |
| Event logging | Partial logging | [19] [20] [21] | Log access events for added security. |
| Passwords | Require change after setup with complexity requirements | [22] [23] | After setting, change the password and meet the complexity requirements. |
| Category score | 2 | ||
| Grade | B |
|---|