As the world of security is moving more and more towards wireless access and internet accessible security systems, Eagle Eye Networks have released a paper recently titled 12 Security Camera System Best Practices: Cyber Safe. The paper focuses on the dos, don’ts, tips and faults that every security system connected to the internet should follow.
Even though the focus of this paper is internet connected systems, a lot of the points mentioned also apply to physical security systems, especially if you want to allow access to your physical system over the internet.
Many of the security checks that should be made are IT system fundamentals such as firewalls and secure passwords, but why should your security system be treated as anything less than your IT network?
Although the full paper is well worth a read, it has been split up into its sections for anyone interested in a particular area of cyber security and keeping your system safe.
These section headers are titled:
- Physical Security: a Dangerous Door for Cyber Attacks
- Major Attack Vectors for Security Camera Systems
- Video Surveillance System types: Cloud vs Traditional
- Twelve Cyber-Security Best Practices for Security Camera Systems
- Conclusion: Video Surveillance Cyber Best Practice Reference Matrix
Section 4, the title section of the paper, is then further split up into what Eagle Eye believe to be the 12 best practices for securing your camera systems. These are:
- Camera passwords
- Port forwarding
- Firewalls
- Network topology (separate cameras)
- Operating systems
- Operating systems passwords
- Vide surveillance system passwords
- Connection encryption
- Video encryption
- Mobile access
- Physical access to equipment and storage
- Video recording software
As you can see from this list, the paper covers aspects of not only camera security such as video encryption and network topology, but also essential computer and IT network security essentials such as operating systems and their passwords, firewalls and port forwarding. Anybody who is thinking of altering their camera network security should first know about general network security.
You can see the full article or request a PDF version of the paper here