How to overcome the hidden dangers of hackers attacking video network surveillance?

Publisher:码字狂徒Latest update time:2014-04-09 Reading articles on mobile phones Scan QR code
Read articles on your mobile phone anytime, anywhere

    On March 27, CCTV reported that home surveillance cameras have high security risks. Hackers used loopholes to break into the network surveillance system and steal user privacy. This news has attracted great attention. With the improvement of people's security awareness, the application of home surveillance systems has become more and more common. Now it has been revealed that the content of the surveillance system has been peeped at. The camera no longer monitors people's safety, but exposes user privacy on the Internet, which will pose a great threat to the personal and property safety of the family.

  Not only home network monitoring systems, but also network monitoring systems in public places, banks, offices, prisons, etc., are also at risk of privacy leakage. With the development of technology, network monitoring has gradually replaced analog monitoring and has been applied to more and more fields. However, the actual application of network monitoring is not very ideal. The lack of broadband and transmission pressure have become key reasons hindering its development. The hacker attack on the monitoring system exposed by CCTV recently has exposed the weakness of the development of network monitoring. How to overcome hidden dangers and protect user privacy and security has become a problem that must be solved in the development of network monitoring.

  How do hackers attack network surveillance videos?

  At present, many surveillance cameras are connected to the Internet. In theory, data can be transmitted as long as they are connected to the Internet. Hackers can spy on the situation at home through networked cameras. Because some users are very careless, they do not change their passwords or use simple passwords to log in, which can easily cause security risks. What is more serious is that hackers may use the attack camera as a springboard to bring down the entire home network or office network, resulting in more serious consequences.

  There are various reasons why network surveillance systems are attacked, some of which are due to vulnerabilities in the surveillance equipment itself, and some are caused by the harm after connecting to the Internet. Some technicians said that some surveillance manufacturers have left backdoors themselves, or there are some defects in their firmware, and hackers can directly use these vulnerabilities to control the camera.

  Moreover, hackers can also use deception to make users see a static picture instead of the real scene when viewing the monitor screen at home remotely. It is conceivable that when the home monitoring system is used by bad guys, it will pose a great threat to the safety of family members and property. What is scary is that the monitoring system with potential security risks is not just the home network monitoring system. The network monitoring systems used in other public places, banks, offices, prisons, etc. also have the risk of privacy leakage.

  Network monitoring bottleneck needs to be solved urgently

  The potential security risks of network surveillance exposed by CCTV have undoubtedly sounded the alarm for the booming surveillance manufacturers. How to create a safe surveillance application environment for users and how to ensure that surveillance videos in public places are not leaked have become issues that security manufacturers should pay attention to. If network cameras want to develop, solving related bottlenecks has become a top priority.

  Since the development of network monitoring, in addition to the problem of security vulnerabilities, with the popularization of high-definition, the amount of video stream data that needs to be transmitted by high-definition video monitoring is huge. Therefore, in reality, network transmission often fails to reach the receiving terminal. How to prevent packet loss during transmission has become a major technical barrier for high-definition network monitoring systems. Since high-definition video monitoring needs to transmit a large amount of video stream data, and the high cost of network transmission and storage will also affect its promotion process.

  Dean Hu Ruimin of Wuhan University's School of Computer Science believes that my country's security network is currently in its early stages and still has some drawbacks. In addition to the existing technical barriers, he believes that insufficient talent reserves, lack of a good market division of labor mechanism, and insufficient management capabilities are also important obstacles to the development of networking.

    He believes that in the past 30 years of security development, the technology was relatively simple, so the technology mastered by the talent team was also relatively simple. After entering the networking, most of the original talent team obviously cannot solve the complex problems in the interconnected network system. The lack of a good market division of labor mechanism is also an important factor hindering the development of networking. The inverted triangle development pattern of security industry enterprises has existed for a long time. Large enterprises fight alone and do not want to solve the problems of network development through cooperation, which in turn affects the development of the industry.

  In addition, the lack of openness of product interfaces and standards between enterprises is also an obstacle to the development of networking. President Hu Ruimin believes that this is closely related to the lack of corporate concepts and management capabilities. Some manufacturers initially promised to open data interfaces, but later refused to do so for various reasons. The concepts of corporate leaders and the lack of industry management capabilities directly hindered the development of networked interconnection and interoperability.

  How to solve the hidden dangers of network monitoring

  Regarding the privacy leakage security risks that are prevalent in current network monitoring systems, CCTV pointed out that relevant departments and manufacturers should intervene in a timely manner to fix loopholes and control risks. Security manufacturers should regularly upgrade product firmware, fix loopholes, etc., provide users with efficient and professional services, and protect the security of home monitoring data.

  Here, we also recommend that users read the manual before using the device to understand the product features. When remote monitoring is not required, it is best to turn off the remote access function. If remote access must be enabled, be sure to change the initial password of the device. When setting the password, try to make the password complex to increase its security.

  When enabling remote access, it is recommended to change the access URL to prevent hackers from gaining access to the technical essentials of the same brand of surveillance equipment and then breaking into all users of the device, thereby reducing the possibility of risks.

  Networking has become a development trend in the security industry. In order to solve the hidden dangers of network monitoring, security manufacturers as the source must strengthen the research and development and management of related technologies and put user interests first.

  In order to solve the problems of lack of technical talents in network monitoring, enterprises fighting alone, and management concepts, all links in the industry need to work together. Whether it is government departments, associations, or security companies, as the cells of the industry, they should work together to promote the development of network monitoring.

Reference address:How to overcome the hidden dangers of hackers attacking video network surveillance?

Previous article:A brief analysis of the application of video surveillance in several hot areas
Next article:Analysis on the development of analog high-resolution cameras and chip technology

Latest Security Electronics Articles
Change More Related Popular Components

EEWorld
subscription
account

EEWorld
service
account

Automotive
development
circle

About Us Customer Service Contact Information Datasheet Sitemap LatestNews


Room 1530, 15th Floor, Building B, No.18 Zhongguancun Street, Haidian District, Beijing, Postal Code: 100190 China Telephone: 008610 8235 0740

Copyright © 2005-2024 EEWORLD.com.cn, Inc. All rights reserved 京ICP证060456号 京ICP备10001474号-1 电信业务审批[2006]字第258号函 京公网安备 11010802033920号