Securing your network while securing your premises

May 2008 Surveillance

Besides superior image quality, intelligent cameras and lower total cost of ownership, Internet Protocol (IP) surveillance systems have also grown in popularity because of their remote accessibility. This is the ability to access the cameras in realtime from anywhere in the world via the Internet.

As with all networked equipment, network cameras have an IP address. This makes it possible for anyone who has an always-on Internet connection to access the camera regardless of their location or device, provided they have the correct IP address. This exposes the IP system to the threats that are commonly associated with the Internet such as hacking and malware.

By its nature, surveillance is all about confidentiality. The data transmitted and saved on a network surveillance system may contain privileged information such as customer information and trade secrets. It goes without saying that the protection of this data should be at the heart of any web-based surveillance system.

Like any secure transmission or delivery process, there are several steps that need to be followed to ensure data integrity is maintained. The first of these is authentication.

Authentication is the most basic aspect of network security. Before gaining access to the network, the user or device needs to identify itself. This is done by providing some kind of identification, for example a username and password or even fingerprint identification in the more sophisticated systems. Most authentication programmes in use today are based on the 802.1x standard.

This standard provides authentication to devices attached to a local area network (LAN) port, establishing a connection or preventing access from that point if authentication fails. In an IP surveillance system, this means that even if a foreign camera is connected to the network through a port, it will still need to be authenticated to gain access to the network and use it.

Apart from keeping outsiders from entering the network, there is sometimes the need to limit network access to only certain individuals in the organisation. But how do you limit access to certain areas on the network without hampering people's ability to do their job?

This question brings us to the next step in securing the network. Even though an authentication identity may be legitimate, it still needs to be validated to gain access to the network. Whenever an authentication code is entered, it is compared to a database or list of correct and approved identities. This is called authorisation. It makes it possible to limit certain sections of the network to only certain individuals in the organisation, and in the same way limits access to certain cameras within a network surveillance system.

The final step in protecting data within a network is through encryption. Encrypting data prevents outsiders from being able to read or use the data. It is important to note though, that encryption could substantially decrease network performance.

Through all this, the protection of single devices against intrusion should not be neglected. Devices such as PCs, servers and individual network cameras should also be protected from unauthorised users, viruses and similar unwanted items.

Access to PCs and servers can be controlled through the use of complex username and password combinations. These should be at least six characters long, combining letters and numbers, and featuring both lower- and uppercase letters.

To protect devices from viruses and worms, a good quality virus scanner with up-to-date filters is recommended. Furthermore, if the LAN is connected to the Internet, it is important to use a firewall to regulate traffic to and from the Internet.

Roy Alves
Roy Alves

Roy Alves is the country manager at Axis Communications South Africa.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Drones and a hint of access control
Surveillance Products & Solutions
Drones are an indispensable tool for security operations, with more functionality and capabilities than ever. Securex Cape Town 2025 will naturally have drone service providers available to light the way for interested parties.

Read more...
Innovations in video management
Arteco Global Africa Surveillance
Visitors to Securex Cape Town this year will have the opportunity to experience Arteco’s latest innovations in video management and integrated security technology, including uSee VMS, Arteco’s hybrid-cloud video management platform.

Read more...
Human-centric control rooms
Iritron Integrated Solutions Surveillance Residential Estate (Industry)
Iritron and Oculus show that when it comes to control rooms, people, not just technology, are at the centre of the most significant performance differentiators today, not just how efficiently the technology works.

Read more...
Smarter security for safer estate living
neaMetrics Suprema Integrated Solutions Surveillance Access Control & Identity Management Residential Estate (Industry)
The expansion of residential estates has led to many communities being constructed with security as an afterthought. Unfortunately, fencing, cameras, and a guard at the gate only create a false sense of safety, which vanishes after the first incident.

Read more...
Secure, long-distance thermal from Keenfinity
Products & Solutions Surveillance Residential Estate (Industry)
The DINION thermal 8100i camera is a bullet thermal camera built for mission-critical applications, prioritising long-distance monitoring and reliable perimeter intrusion detection with built-in Intelligent Video Analytics (IVA) Pro Perimeter video analytics.

Read more...
IVA AI Pro Visual Gun Detection
Products & Solutions Surveillance Security Services & Risk Management Residential Estate (Industry)
Bosch has announced the launch of the IVA AI Pro Visual Gun Detection analytics based on deep learning. It is designed for automatic detection and classification of people and brandished firearms.

Read more...
IP-based horn loudspeakers
Products & Solutions Surveillance Security Services & Risk Management Residential Estate (Industry)
Bosch has announced the launch of its new IP-based horn loudspeakers and amplifier module: the high-output LHN-UC15L-SIP horn (for long-throw applications), the compact LHN-UC15W-SIP horn (for wide-angle coverage) and the AMN-P15-SIP amplifier module.

Read more...
Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Make BIG and COMPLEX small and manageable
neaMetrics Suprema AI & Data Analytics Surveillance Integrated Solutions
Traditional CCTV and access systems often operate separately, creating gaps in visibility and efficiency. TRASSIR and Suprema have partnered to develop an integrated platform that improves security, operations, and situational awareness.

Read more...
Get the AI fundamentals right
Leaderware Editor's Choice Surveillance AI & Data Analytics
Much of the marketing for CCTV AI detection implies the client can just drop the AI into their existing systems and operations, and they will be detecting all criminals and be far more efficient when doing it.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.