Cyber security news for all

More

    Cyber Risks Of Embedded Video Systems

    Digitization and networking are also changing video security technology fundamentally: Classic analog video cameras with directly assigned video recording devices are becoming more and more powerful. They replace IP cameras that operate in a complex IT infrastructure. This also increases the challenges for a safe one.

    Underestimated Risk Of Embedded Systems

    PCs and servers are considered security relevant. Risks that of embedded systems occur are products from the smart home area, alarm systems and cameras which are often underestimated. This has the consequence that data security is often neglected. This means that only a closed group of users can access this system and its data. With the changeover to IP, worldwide access is fundamentally possible. Therefore, you must take appropriate technical precautions to ensure that also IP-based video systems become closed systems again. The top security rule for video security systems is: The network may only allow the explicitly desired connections. IP addresses must be blocked, logged and be reported.

    Embedded Video Systems

    Alternative Solutions

    The risk of unwanted connections leaves appropriate technical precautions to avoid. That may be a bit more complex and more expensive, but if security is neglected, it can do a lot in the long run. It is advantageous to have a suitable security concept when planning a video system. The following alternatives are available and can complement each other:

    Separate Network For Video

    The largest network has its own network for the security: The physical separation of softwares can overcome lines. However, cable routes often force video over transport existing lines.

    Video Security Gateway

    A video security gateway monitors everyone for incoming and outgoing connections and combines various security measures that are specific to the needs of the video security technology can be coordinated in the respective application:

    The firewall only leaves those explicitly desired connections to the router that establishes connections according to predefined rules. The protocol analysis detects suspicious data traffic. Virus scanner checks all incoming data malicious code. Even if the video transmission could only be designed for TCP / IPv4 the malicious software uses the IPv6, ICMP or DNS.

    Recent Articles

    Millions of RDP attacks on home offices

    Since the corona related move to the home office, the number of daily hacker attacks on remote desktop connections has increased more than tenfold....

    KuCion crypto confirms 150 million dollar security breach

    Cyber criminals were able to steal from the KuCion crypto and stole coins worth millions. On the evening of last Friday, KuCion crypto noticed...

    Hungarian banks were the target of a massive DDoS attack

    Several banks and the Hungarian Telekom have been the target of a cyber attack. The attacks are said to have come in several waves...

    The source code of Windows XP is leaked

    The source code of Windows XP is currently freely accessible. The media says that data first appeared on 4chan and is currently being exchanged...

    Hackers send malicious Azure Cloud apps to Microsoft

    Microsoft has banned some Azure Cloud applications from its cloud that the company identified as part of an attack infrastructure. Microsoft describes the approach...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox