Securing your network while securing your premises

May 2008 CCTV, Surveillance & Remote Monitoring

Besides superior image quality, intelligent cameras and lower total cost of ownership, Internet Protocol (IP) surveillance systems have also grown in popularity because of their remote accessibility. This is the ability to access the cameras in realtime from anywhere in the world via the Internet.

As with all networked equipment, network cameras have an IP address. This makes it possible for anyone who has an always-on Internet connection to access the camera regardless of their location or device, provided they have the correct IP address. This exposes the IP system to the threats that are commonly associated with the Internet such as hacking and malware.

By its nature, surveillance is all about confidentiality. The data transmitted and saved on a network surveillance system may contain privileged information such as customer information and trade secrets. It goes without saying that the protection of this data should be at the heart of any web-based surveillance system.

Like any secure transmission or delivery process, there are several steps that need to be followed to ensure data integrity is maintained. The first of these is authentication.

Authentication is the most basic aspect of network security. Before gaining access to the network, the user or device needs to identify itself. This is done by providing some kind of identification, for example a username and password or even fingerprint identification in the more sophisticated systems. Most authentication programmes in use today are based on the 802.1x standard.

This standard provides authentication to devices attached to a local area network (LAN) port, establishing a connection or preventing access from that point if authentication fails. In an IP surveillance system, this means that even if a foreign camera is connected to the network through a port, it will still need to be authenticated to gain access to the network and use it.

Apart from keeping outsiders from entering the network, there is sometimes the need to limit network access to only certain individuals in the organisation. But how do you limit access to certain areas on the network without hampering people's ability to do their job?

This question brings us to the next step in securing the network. Even though an authentication identity may be legitimate, it still needs to be validated to gain access to the network. Whenever an authentication code is entered, it is compared to a database or list of correct and approved identities. This is called authorisation. It makes it possible to limit certain sections of the network to only certain individuals in the organisation, and in the same way limits access to certain cameras within a network surveillance system.

The final step in protecting data within a network is through encryption. Encrypting data prevents outsiders from being able to read or use the data. It is important to note though, that encryption could substantially decrease network performance.

Through all this, the protection of single devices against intrusion should not be neglected. Devices such as PCs, servers and individual network cameras should also be protected from unauthorised users, viruses and similar unwanted items.

Access to PCs and servers can be controlled through the use of complex username and password combinations. These should be at least six characters long, combining letters and numbers, and featuring both lower- and uppercase letters.

To protect devices from viruses and worms, a good quality virus scanner with up-to-date filters is recommended. Furthermore, if the LAN is connected to the Internet, it is important to use a firewall to regulate traffic to and from the Internet.

Roy Alves
Roy Alves

Roy Alves is the country manager at Axis Communications South Africa.


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Qognify VMS adds support for Pelco IP camera series
CCTV, Surveillance & Remote Monitoring Products
The latest IP camera series from Pelco can now be used with Qognify’s advanced video solution for corporate and enterprise projects, increasing the overall number of camera models and third-party devices supported in Qognify VMS to more than 6 500.

VIVOTEK launches VAST Security Station
CCTV, Surveillance & Remote Monitoring Products
VIVOTEK officially launched its AI security system, VAST Security Station (VSS), in March, available to users in three flexible tiers: VSS Lite, VSS Standard, and VSS Professional.

Keeping students, staff and communities safe
Vumacam News CCTV, Surveillance & Remote Monitoring Security Services & Risk Management
South African schools are facing increasing security challenges, making effective surveillance systems more important than ever. To address this issue, Vumacam is offering advanced security solutions with security partners, aimed at keeping students, staff, and the community safe.

Helping to care for zoo animals
Hikvision South Africa CCTV, Surveillance & Remote Monitoring
Zoo keeps an eye on the safety of animals and visitors through the installation of Hikvision 4 MP turret, 12 MP Fisheye cameras, as well as PTZs, NVRs and central management system.

Boosting digital-intelligent transformation and AI applications
Dahua Technology South Africa CCTV, Surveillance & Remote Monitoring Products
2022 has been a year full of development and innovation for Dahua. The company has launched various upgrades to its existing product portfolio as well as an artillery of new products and solutions that address specific needs/problems in society.

Arcules and IMMIX announce integration
News CCTV, Surveillance & Remote Monitoring Products
Arcules has announced that its integration with Immix Central Station and Guard Force is available. The integration provides Central Station and Guard Force users a way to manage, verify, and respond to security events, while using Arcules-managed video feeds.

Developing an effective CCTV control room culture
Leaderware Editor's Choice CCTV, Surveillance & Remote Monitoring Training & Education
Organisational culture in organisations can be seen as the set of values, practices, focus, standards and behaviours, and ways of interacting with others that are accepted and subscribed to by the people who work there.

Eagle Eye Networks releases 2023 Video Surveillance Trends Report
Eagle Eye Networks News CCTV, Surveillance & Remote Monitoring
Eagle Eye Networks has released the 2023 Trends in Video Surveillance ebook, identifying five trends that will have the largest impact on businesses around the globe in 2023.

Stainless steel 8 MP dome
Axis Communications SA Products CCTV, Surveillance & Remote Monitoring
Enclosed in marine-grade stainless steel (SS 316L) and DNV-certified, the AXIS Q3538-SLVE can withstand the corrosive effects of seawater and cleaning chemicals.

Enhanced image clarity and enriched AI functions
Dahua Technology South Africa CCTV, Surveillance & Remote Monitoring Products
The IPC WizMind S series is equipped with multiple intelligent functions, offers adaptability, and comes in plastic-free packaging, enabling better image performance, promoting environmental sustainability, and providing global clients with smarter vision with a stronger surveillance shield.