Join or Sign in

Register for your free asmag.com membership or if you are already a member,
sign in using your preferred method below.

To check your latest product inquiries, manage newsletter preference, update personal / company profile, or download member-exclusive reports, log in to your account now!
Login asmag.comMember Registration
https://www.asmag.com/rankings/
INSIGHTS

Cybersecurity: a growing issue for surveillance systems

Cybersecurity: a growing issue for surveillance systems
Video surveillance has become ubiquitous with today’s modern security system found in small private installations to massive enterprise projects. Many are also migrating from an analog- to an IP-based or cloud managed security system, believing (rightly) that features such as better resolution, remote access, and accompanying analytic software will enhance the overall security provided.
Video surveillance has become ubiquitous with today's modern security system found in small private installations to massive enterprise projects. Many are also migrating from an analog- to an IP-based or cloud managed security system, believing (rightly) that features such as better resolution, remote access, and accompanying analytic software will enhance the overall security provided.

However, it is imperative for both users and installers to be aware that for all its positive attributes, the resulting infrastructure can also make their system more vulnerable to cyberattacks.

Case In Point
Recently in Taiwan, around 296 private video feeds from various restaurants, private dwellings, offices, and stores were hacked and broadcasted online without the owners' knowledge or permission. Business transactions, the comings and goings of owners and customers, and private interactions were all caught on camera and were reportedly watched by over 20,000 people around the world.

One of the victims involved in this debacle was the owner of a luxury car dealership who installed a cloud-based IP security system about a year ago. He was shocked to discover that four out of the sixteen security cameras that can be remotely accessed were hacked, the footage of which is being shown online at all hours of the day.

Further investigation in this matter revealed that the breach didn't occur within the places themselves, but rather with the cloud security service provider that they all used; thus, ironically rendering the system that was supposed to enhance security into a great liability and a safety risk.

Vulnerabilities in Security Systems
Using an IP-based security system can become easily accessible entry points for unwanted visitors into a private network. Users can become unknowing culprits, using default or weak passwords or asking for remote access privileges that can, in some cases, decrease the security of the system.

Installers and integrators, who do not prioritize cyberdefense, can also be weak links in the chain as they would not proactively "harden" the system against intrusion, which refers to the act of securing a system by reducing the number of potential breach points at which the attacker can enter such as unnecessary open ports.

Video surveillance equipment manufacturers hoping to win in a price competition may try to cut corners by not performing the full range of tests needed to adequately determine the security vulnerabilities of their hardware and software.

An additional problem is the fact that there just aren't a lot of solutions available right now and most of them require high levels of IT expertise and knowledge for implementation; thus, resulting in many installers or users bypassing the installation of certain protective measures that can protect the system and just sticking with basic protocols such as firewalls.

Cyberdefense Should Become a Priority
As physical security systems increasingly merge with the IP world, cybersecurity should be on everybody's top agenda because cyberattacks are expected to grow in range and severity in the near future. Integrators and installers can play an integral role in preventing this if they continue to educate themselves and build systems focused on minimizing threats.
Subscribe to Newsletter
Stay updated with the latest trends and technologies in physical security

Share to: