Securing your network while securing your premises

May 2008 Surveillance

Besides superior image quality, intelligent cameras and lower total cost of ownership, Internet Protocol (IP) surveillance systems have also grown in popularity because of their remote accessibility. This is the ability to access the cameras in realtime from anywhere in the world via the Internet.

As with all networked equipment, network cameras have an IP address. This makes it possible for anyone who has an always-on Internet connection to access the camera regardless of their location or device, provided they have the correct IP address. This exposes the IP system to the threats that are commonly associated with the Internet such as hacking and malware.

By its nature, surveillance is all about confidentiality. The data transmitted and saved on a network surveillance system may contain privileged information such as customer information and trade secrets. It goes without saying that the protection of this data should be at the heart of any web-based surveillance system.

Like any secure transmission or delivery process, there are several steps that need to be followed to ensure data integrity is maintained. The first of these is authentication.

Authentication is the most basic aspect of network security. Before gaining access to the network, the user or device needs to identify itself. This is done by providing some kind of identification, for example a username and password or even fingerprint identification in the more sophisticated systems. Most authentication programmes in use today are based on the 802.1x standard.

This standard provides authentication to devices attached to a local area network (LAN) port, establishing a connection or preventing access from that point if authentication fails. In an IP surveillance system, this means that even if a foreign camera is connected to the network through a port, it will still need to be authenticated to gain access to the network and use it.

Apart from keeping outsiders from entering the network, there is sometimes the need to limit network access to only certain individuals in the organisation. But how do you limit access to certain areas on the network without hampering people's ability to do their job?

This question brings us to the next step in securing the network. Even though an authentication identity may be legitimate, it still needs to be validated to gain access to the network. Whenever an authentication code is entered, it is compared to a database or list of correct and approved identities. This is called authorisation. It makes it possible to limit certain sections of the network to only certain individuals in the organisation, and in the same way limits access to certain cameras within a network surveillance system.

The final step in protecting data within a network is through encryption. Encrypting data prevents outsiders from being able to read or use the data. It is important to note though, that encryption could substantially decrease network performance.

Through all this, the protection of single devices against intrusion should not be neglected. Devices such as PCs, servers and individual network cameras should also be protected from unauthorised users, viruses and similar unwanted items.

Access to PCs and servers can be controlled through the use of complex username and password combinations. These should be at least six characters long, combining letters and numbers, and featuring both lower- and uppercase letters.

To protect devices from viruses and worms, a good quality virus scanner with up-to-date filters is recommended. Furthermore, if the LAN is connected to the Internet, it is important to use a firewall to regulate traffic to and from the Internet.

Roy Alves
Roy Alves

Roy Alves is the country manager at Axis Communications South Africa.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
SMART and secure estates in Cape Town
Technews Publishing Axis Communications SA Gallagher DeepAlert Nemtek Electric Fencing Products Editor's Choice
In February 2024, SMART Security Solutions emigrated to the Western Cape to host its first SMART Estate Security Conference in the region in many years. For the day, we took over the prestigious D’Aria Wine Estate.

Read more...
SMART Estate Security returns to KZN
Nemtek Electric Fencing Products Technews Publishing Axis Communications SA OneSpace Editor's Choice News & Events Integrated Solutions IoT & Automation
The second SMART Estate Security Conference of 2024 was held in May in KwaZulu-Natal at the Mount Edgecombe Estate Conference Centre, which is located on the Estate’s pristine golf course.

Read more...
Horn speakers from Sunell
Forbatt SA Products & Solutions Surveillance Residential Estate (Industry)
Horn speakers are an effective tool for actively deterring intruders from entering estates. By emitting loud, clear audio warnings, horn speakers can alert trespassers that they have been detected and are being monitored.

Read more...
Sunell’s range of thermal cameras
Forbatt SA Products & Solutions Surveillance Residential Estate (Industry)
Thermal cameras offer significant value to estate security. Their ability to provide reliable surveillance in all lighting and weather conditions ensures continuous monitoring, providing a constant sense of security and reducing the likelihood of security breaches.

Read more...
Integrating radar and surveillance
Forbatt SA Products & Solutions Surveillance Residential Estate (Industry)
Integrating radar with CCTV video systems significantly enhances estate security by providing long-range threat detection and comprehensive monitoring capabilities. This combination leverages the strengths of both technologies, offering several key benefits.

Read more...
Sunell anti-corrosion cameras
Forbatt SA Products & Solutions Surveillance Residential Estate (Industry)
With Sunell’s anti-corrosion range of cameras, the initial investment in anti-corrosion CCTV cameras may be higher than standard cameras, but the long-term benefits outweigh the upfront costs.

Read more...
Latest AI solution to manage guards
DeepAlert Products & Solutions Surveillance AI & Data Analytics
No guard at the guardhouse? Guard under duress? Guard asleep? DeepAlert’s AI technology delivers real-time alerts to mobile phones and video management systems, helping you manage your guards more effectively.

Read more...
Axis advanced radar system
Axis Communications SA Products & Solutions Surveillance Residential Estate (Industry)
The Axis D2210-VE also offers a radar-video fusion model, combining the strengths of both technologies to provide comprehensive monitoring and enhanced situational awareness.

Read more...
Using KPIs to measure smart city progress
Axis Communications SA Residential Estate (Industry) Integrated Solutions Security Services & Risk Management
United 4 Smart Sustainable Cities is a United Nations Initiative that encourages the use of information and communication technology (including security technology) to support a smooth transition to smart cities.

Read more...