Jump to navigation

Home
  • PRODUCTS
    • Surveillance Systems
      • Geovision
        • IP Camera
        • Recording Systems
        • PoE Switch
        • Video Management
        • Video Capture Card
        • Video Server
        • LPR/ANPR
        • Hardware Accessory
    • Access Control
      • Geovision
        • Controllers
        • Accessories
        • Readers
        • Software
  • PROJECTS
    • Airports
    • Banking
    • Education
    • Entertainment
    • Government
    • Hotel
    • Industry
    • Retail
  • SOLUTIONS
    • Access Control
    • Airport Surveillance
    • Banking Surveillance
    • City Surveillance
    • Hotel Surveillance
    • Retail Surveillance
  • DOWNLOAD
    • Softwares
      • GV-Access for Android
      • GV-Access for iOS
      • GV-VMS
      • GV-Recording Server
      • CMS Lite
      • CMS Server
      • GV-ASManager
      • GV-AView for Android
      • GV-Backup Center
      • GV-CMS
      • GV-Center V2
      • GV-Center V2 Pro
      • GV-Cloud Center
      • GV-Control Center
      • GV-DVR
      • GV-Data Capture V3.1
      • GV-Dispatch Server
      • GV-Eye for Android
      • GV-Eye for iOS
      • GV-Failover Server
      • GV-GIS
      • GV-Hybrid DVR
      • GV-LPR
      • GV-Mobile Server
      • GV-NVR
      • GV-POS S/W Capture
      • GV-POS Text Sender
      • GV-Redundant Server
      • GV-Selector for Android
      • GV-Selector for iOS
      • GV-Video Gateway
      • GV-Video Wall
      • GV-Vital Sign Monitor
      • GV-Web Report
      • GVcloud NotifyApp for Android
      • GVcloud NotifyApp for iOS
      • GV‐Edge Recording-Mac
      • GV‐Edge Recording-Windows
    • Presentations
      • Geovision
        • Geovision VMS Pro
        • Geovision New Target Series
        • GV-PoE-extender
        • Geovision LPR Solution
        • GV-NVR Catalogue
        • Presentation 2016
        • GV-NVR Partner Catalogue
        • Catalogue 2014
    • Advertisements
      • Geovision
        • GV-VR360
    • Videos
    • Forms
      • Register Project
      • Partnership
      • Guarantee
  • REPORTS
    • Articles
    • News
  • ABOUT US
    • Introduction
    • Our Brands
    • Certificates
    • Distribution
    • Exhibitions
    • Publish
    • Media
  • SUPPORT
    • FAQ
      • Compact DVR & Video Server
      • DVR Capture card,Accessories
      • DVR/NVR Playback
      • DVR/NVR Software
      • IP Camera
        • Question Number 1
        • Question Number 2
        • Question Number 3
        • Question Number 4
        • Question Number 5
        • Question Number 6
      • Remote/Mobile Viewing
      • Retail Solution,POS integration
    • Guarantee
    • PARTNERS
    • RMA
    • Sales
    • Servises
    • Shipping
    • Training
  • TECHNOLOGIES
    • geovision
      • AI-LPR Geovision Solution
      • Emergency Lockdown/Unlock
      • GV-CS1320 Camera Reader
      • GV-LPR1200 LPR Camera
      • GV-NAS2008
      • GV-PPTZ7300 IP Camera
      • GV-SD2301 PoE
      • GeoVision Smart Factory
      • Geovision 12Mp Series
      • Geovision BuildingAutomation
      • Geovision Cloud Cameras
      • Geovision Decoder Box
      • Geovision End to End Solution
      • Geovision GV-AI FR
      • Geovision GV-AS1520
      • Geovision GV-CS1320
      • Geovision GV-Live Streaming
      • Geovision H.265 SNVR
      • Geovision H.265 Series
      • Geovision H.265 Solution
      • Geovision LPR Solution
      • Geovision PN400
      • Geovision PPTZ7300
      • Geovision PTZ+FISHEYE
      • Geovision Parking Solution
      • Geovision Pinhole IP Camera
      • Geovision-IPAS 2017
      • Introducing GV-VMS V.18.1.
      • Introducting GV-AI Server
      • Panoramic PTZ Series
      • Star Light Target
      • ntroducting GV-AI Server

Search

Shopping cart

Your shopping cart is empty.

User menu

  • Register
  • Login

Understanding Cybersecurity Risks of an Access Control System

Understanding Cybersecurity Risks of an Access Control System

Submitted by r.izadi on Mon, 07/17/2017 - 11:46

As more and more security surveillance solutions become IP-based, the threat of cybersecurity is becoming increasingly critical. Recent months have seen increasing numbers of attacks that have exploited various vulnerabilities in operating systems and given hackers access to sensitive information that included surveillance data. And if such malicious attempts were not enough to cause panic, there was also the ransomware attack that infected thousands of computers and sent cybersecurity specialists scrambling for answers.

 

In this context, it is reassuring to see that several physical security companies are coming forward to take steps to ensure that their solutions are as safe as possible from hackers and malware.

 

 

 

Potential weak links

Physical access control systems are sophisticated IT applications in their own right. They communicate on the network and feature all the hardware and software components that can be vulnerable to cyber-attacks, unless cyber protective measures are an integrated part of the design.

 

A typical access control system can consists of several different kinds of devices that could be of varying age, model etc. scattered throughout a building. For several organizations there is great potential to improve unmanaged, and therefore unsecure, weak links to an access control system.

 

In addition, physical access control really should be one of the first lines of cyber defense. This means that security of the security system should be a high priority. And don’t forget: people can often be the weakest link, no matter how sophisticated your security system is.
 

 

Most underestimated security risks
 

 

Despite the recent cyberattacks and the warnings that have followed it, there are still several organizations that are yet to take the security of physical security systems seriously. In fact, the most underestimated security risk is not having a combined IT and physical security strategy. Underestimating the fact that physical security systems need to have the same “end to end” security protection as other business critical systems could be a real vulnerability.

 

 

 

Physical security system owners and operators are generally not from the IT security department and they have different work-streams and objectives. Therefore, they tend to see a different set of risks. For physical security, IT may be just a part of getting things connected - which can be a challenge in its own right - and they do not demand that IT should determine policy for security of the device or system being connected.

 

Perhaps most importantly, with the policy of combining IT and physical security, there needs to be a process in place that will ensure what cyber-secure system features are expected and how they will be maintained without getting outdated. It requires a combined physical and cyber approach, bringing together the knowledge and expertise of each. This joint approach should also apply to suppliers by the way.

 

In short, as far as end users and systems integrators are concerned, cyber security threats should be as serious as a physical security threat. Neglecting this could turn out to be disastrous for an organization. 

 

 

 

Source: a&s Magazine

برچسب‌ها: 
Access Control, surveillance systems, IP camera
  • Log in or register to post comments
  • فارسی
  • CONSULT PLAN
  • REGISTER PROJECT
  • SELECT PRODUCT

FOLOW US

NEWSLETTER