Dispelling the myths of IP video: Myth #5: IP transmission is insecure for video

July 2007 Surveillance

In this series, Roy Alves, country manager of Axis Communications South Africa, examines 10 myths about IP video.

Roy Alves
Roy Alves

One of the most pervasive misconceptions about using Internet protocol to transmit video for security and surveillance applications is that the transmission is insecure. This is largely due to the general perception that the Internet is a portal to any and all information. Additionally, there have been news stories about intruders accessing network cameras after finding them through Google searches.

The IP-based networks used for video are the same as the networks used by corporations, banks, governments and hospitals for transferring data, e-mail and voice over IP. These networks are safe conduits for sensitive information if the correct security measures, such as firewalls, virtual private networks and password protection, are implemented. The same security precautions need to be taken when transferring video.

There are many examples of network video installations that monitor highly sensitive activities. Network video has been used for security during the Olympic Games, in downtown Washington, DC, and at major airports and government facilities. In all of these cases, those who installed and operated the systems took precautions to ensure that video would be kept secure.

Securing a security system

There are three important ways to ensure secure transmissions via the Internet: authentication, authorisation and privacy protection.

Authentication and authorization. These go hand in hand. A device or user must identify itself to the network before gaining access, so it provides identity and access information to the network or system, such as via a username and password. Once the connection has been authenticated, the system compares the submitted information to a database of approved identities to establish the permissions to be granted. Once the authorisation is complete the device is fully connected and operational in the system, or the user is free to use all authorised network features.

Password protecting network cameras and video servers is just as important as protecting your PC or servers. Passwords should be at least six characters long, combine numbers and letters, and mix lower and upper case. Most network cameras support anonymous user access by default, which means that in the absence of a password, the video is made available to everyone with access to the network. If a video application needs to be highly secure, IP filtering should be used, meaning that the network camera will only send video if the request comes from a certain IP address, preventing access to unauthorised computers even if they have a valid username and password.

Privacy protection. Encryption prevents unauthorised users from accessing data. Two of the more commonly used encryption methods are virtual private networks (VPNs) and hypertext transfer protocol over secure socket layer (HTTPS). A VPN is a way to use public infrastructure such as the Internet to provide remote users with secure access to a network. The VPN essentially creates a secure 'tunnel' between the end points; only authorised devices or users can operate within the VPN. The data itself is not secured within the VPN, but anyone not on the VPN (such as when it is travelling over public carriers) sees only encrypted data. If the data must be protected end-to-end, ie, between the camera and a client PC for example, HTTPS can be used. Most network cameras act as mini-Web server. HTTPS is a Web protocol that encrypts and decrypts user page requests as well as the pages that are returned by the Web server. When a connection between the two devices is requested, the user or a third-party body such as Verisign verifies certificates that have been issued to the two devices. If the user or third party determines that the devices can be trusted, an encrypted communication is opened. HTTPS is commonly used when creating a connection to secure websites such as online banking pages.

Firewalls can serve as gatekeepers, blocking or restricting traffic to and from the Internet. They can prevent outsiders from accessing private data and control what information remote users can access.

A safe solution, well managed

Today's professional network cameras have built-in password protection, IP filtering and encryption, which make them very secure. In addition, the recorded video can include the unique hardware number of the camera, called the media access control address. This confirms the origination of the video and helps make network camera technology more trustworthy than analogue. The New York State Unified Court System (UCS) is a prime example of how these security techniques can be used effectively. The UCS, which has more than 30 court buildings in New York State, uses rigid firewalls and security settings to protect its video system from hackers and other security risks. The technology team developed its own Linux-based video management software and created an advanced permissions system to allow different users access only to certain cameras. This means that images can be viewed from any courthouse PC, but only by the people who have permission to view it. For added security, the UCS even opted to transmit the video over its own high-speed fibre network rather than over the Internet.

Viruses and worms

Network video users are sometimes concerned about software viruses and worms. Viruses are commonly transmitted in e-mail attachments or file downloads. While some viruses are harmless, others can erase data and can require that an entire hard disk be reformatted. A worm is a virus that automatically resends itself as an e-mail attachment or as part of a network message. A worm typically does not alter files but resides in active memory and duplicates itself. Often, worms go unnoticed until they slow down a system and cause errors. Most network cameras do not have an open operating system or hard disks, so worms and viruses cannot infect them. The servers that are used for video management in a network video system, called network video recorders, are standard Microsoft, Unix or Linux servers for which a virus scanner with up-to-date filters can be used. This should be installed on all computers, and operating systems should be regularly updated with service packs and fixes from the manufacturer. In an analogue video system with a proprietary DVR, protective software and updates are normally not available. This makes such systems vulnerable if connected to an IP-based network.

Although making IP-based networks safe for video may seem a little complicated the requirements are no different from the requirements of any business network. The techniques discussed above are proven methods that the IT industry has used for many years. In contrast, analogue systems offer no way to authenticate or encrypt information, making it easier for anyone to tap into the cables and illicitly view 'secure' video transmissions. In addition, it is possible to substitute one video stream for another, just the as the band of thieves did in the movie Ocean's 11. Had Terry Benedict's security staff used network video technology, the outcome would have certainly been quite different for Danny Ocean and his accomplices.

For more information contact Roy Alves, Axis Communications Africa, +27 (0)11 548 6780, [email protected], www.axis.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Vumacam highlights concerns with proposed Johannesburg CCTV by-laws
Vumacam News & Events Surveillance
Vumacam has raised objections to critical provisions of the by-laws governing privately owned CCTV cameras with a view of public spaces in the city, which were promulgated on Friday, 28 February 2025.

Read more...
Milestone announces a platform to enable access to data and train AI models
Surveillance AI & Data Analytics
Milestone Systems has announced Project Hafnia to build services and democratise AI-model training with high-quality, compliant video data leveraging NVIDIA Cosmos Curator and AI model, fine-tuning microservices.

Read more...
Benchmark in long-range surveillance
Duxbury Networking Surveillance Products & Solutions
Duxbury Networking says the long-range, high-resolution monitoring AXIS Q1809-LE bullet camera has been enhanced further with integration into Milestone XProtect to set a new standard for forensic-level image clarity, intelligent event detection, and enhanced security management.

Read more...
AI for retail risk management
Surveillance Retail (Industry) AI & Data Analytics
As businesses face mounting challenges in a volatile economic environment, Ares-i remains an essential tool for proactively identifying, assessing, and mitigating risks that threaten operational stability and customer satisfaction.

Read more...
The need for integrated control room displays
Leaderware Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
Six key security technology trends in 2025
Axis Communications SA Surveillance
Axis Communications examines some new trends for the security sector in 2025, as well as some new, old trends that are once again highlighted because of their benefit to the end user in the race to obtain optimal value from technology installations.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
The impact of video analytics on business security
AI & Data Analytics Surveillance
As more enterprises work to integrate AI-enabled solutions into their networks, enterprises must not lose sight of the implications of these integrations and the added value they are working to unlock.

Read more...
The need for integrated control room displays
Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
Integration is the key to smarter surveillance
Duxbury Networking Surveillance
According to recent market projections, the local security industry is expected to grow by more than 10% annually through 2029, reflecting the increasing demand for smarter, more proactive security solutions.

Read more...