Cyber security news for all


    Cyber Risks Of Embedded Video Systems

    Digitization and networking are also changing video security technology fundamentally: Classic analog video cameras with directly assigned video recording devices are becoming more and more powerful. They replace IP cameras that operate in a complex IT infrastructure. This also increases the challenges for a safe one.

    Underestimated Risk Of Embedded Systems

    PCs and servers are considered security relevant. Risks that of embedded systems occur are products from the smart home area, alarm systems and cameras which are often underestimated. This has the consequence that data security is often neglected. This means that only a closed group of users can access this system and its data. With the changeover to IP, worldwide access is fundamentally possible. Therefore, you must take appropriate technical precautions to ensure that also IP-based video systems become closed systems again. The top security rule for video security systems is: The network may only allow the explicitly desired connections. IP addresses must be blocked, logged and be reported.

    Embedded Video Systems

    Alternative Solutions

    The risk of unwanted connections leaves appropriate technical precautions to avoid. That may be a bit more complex and more expensive, but if security is neglected, it can do a lot in the long run. It is advantageous to have a suitable security concept when planning a video system. The following alternatives are available and can complement each other:

    Separate Network For Video

    The largest network has its own network for the security: The physical separation of softwares can overcome lines. However, cable routes often force video over transport existing lines.

    Video Security Gateway

    A video security gateway monitors everyone for incoming and outgoing connections and combines various security measures that are specific to the needs of the video security technology can be coordinated in the respective application:

    The firewall only leaves those explicitly desired connections to the router that establishes connections according to predefined rules. The protocol analysis detects suspicious data traffic. Virus scanner checks all incoming data malicious code. Even if the video transmission could only be designed for TCP / IPv4 the malicious software uses the IPv6, ICMP or DNS.

    Recent Articles

    Related Stories