Access Control and Video Surveillance
Engin Özer
05 February 2019
Within recent years, camera systems of almost all brands have been hacked! So all the private images of people and organizations were accessible, and these images are circulating on the Internet. They even have websites that broadcast live from all over the world without obtaining the permit of any person. Many brands cannot cope with these hackers. Although some of them have achieved some significant developments under the heading of Cyber Security, hackers can find their back doors and access the images in a short time.
With hackers entering the systems so quickly, the industry's leading brands have started to take a multidisciplinary series of measures and publish solutions appropriate to the security level of the facilities. You can find a few examples below.
- The camera network must be operated independently from the existing network.
- Encryption and password protection of video databases and exports must be enabled.
- Evidence Protection Feature: The images determined by the user, in which they are evidenced, must be protected by activating the evident protection feature that prevents deletion and overwriting within the desired period.
- HTTPS secure camera connection should be used.
- Digital signature and export of video databases should be programmed.
- Windows AD user authentication must be enabled via Microsoft NTLM or Kerberos authentication.
- Strict and time-controlled user rights management should be implemented.
- Secure and encrypted (HTTPS) access should be used for web and mobile client users.
- An Audit Log must be made which ensures full traceability of the user actions.
- Dual authentication provides additional system security for customers using high-security installations. A user must allow access to the system after confirming login with a successful authorization by the second user.
- Firewall should be used. Their software must be kept constantly updated.
- All cameras and devices must be kept updated with the latest version firmware at all times.
Cloud Based Security Systems »
Another method to be used is to establish a VPN Connection. Since this will provide a point-to-point connection, you will create a very difficult layer for hackers to pass through. In addition to these, certain brands have been able to work with international software companies and make some of their models more protected against cyber attacks with licensed certificates.
CCTV and Video Control Systems We Install »