SlideShare a Scribd company logo
1 of 3
Download to read offline
1. Pros and Cons of IP CCTV:
New threats are introduced to the security world as systems migrate from traditional analogue to
IP network-enabled systems particularly in video surveillance. Internet Protocol (IP) provide an
open platform for integration at the data level of multiple security and life safety devices and
applications.
Pros:
Lower initial cost: Harnissing the IT infrastructure reduces installation costs in cabling,
associated containment and power outlets.
Wide-spread compatibility
Provides flexibility and scalability
Higher security and resilience
The tight software integraion between systems make them more intelligent and reduces security
gaps, speed up the response time.
Cons:
It revolves arond network security and hackers threat.
The risk increases if camera is accesses from the mobile or phone.
Threat to the security industry and thus security from the IT sector.
2.
3. User education about security:
It is one of the hardest security layers for administrators to implement.Some of the tips are:
4. There are many problems associated with the boimetrics like fingerprints, iris patterns, face
scan, voice recognization. Make sure that the biometric data is a sensitive data compared to
others and is encrypted in transit from the biometrics device to the directory or database housing
the authentication credentials. Some biometrics readers are on USB keys or tokens that connect
to the computer. These devices should provide encryption.
Either at rest or in transit, the key to protecting biometric data is encryption and then secure
storage in a directory service such as AD or LDAP.
5. Organizations need to take pro-active steps to define the accetable use of portable storage
devices like USB flash drives within the environment and then put the tools and technology in
place to help monitor and enforce the policy and protect the network and data from the risk
caused by USB flash drives. Many organizations have an acceptable use policy defined, which
users must agree to. The Acceptable Use Policy (AUP) essentially defines how users are allowed
to use the internet, e-mail, telephones and other cmmunications and network resources.
The Group policy is an effective tool for computer on the network and enforcing the security
policies.
Solution
1. Pros and Cons of IP CCTV:
New threats are introduced to the security world as systems migrate from traditional analogue to
IP network-enabled systems particularly in video surveillance. Internet Protocol (IP) provide an
open platform for integration at the data level of multiple security and life safety devices and
applications.
Pros:
Lower initial cost: Harnissing the IT infrastructure reduces installation costs in cabling,
associated containment and power outlets.
Wide-spread compatibility
Provides flexibility and scalability
Higher security and resilience
The tight software integraion between systems make them more intelligent and reduces security
gaps, speed up the response time.
Cons:
It revolves arond network security and hackers threat.
The risk increases if camera is accesses from the mobile or phone.
Threat to the security industry and thus security from the IT sector.
2.
3. User education about security:
It is one of the hardest security layers for administrators to implement.Some of the tips are:
4. There are many problems associated with the boimetrics like fingerprints, iris patterns, face
scan, voice recognization. Make sure that the biometric data is a sensitive data compared to
others and is encrypted in transit from the biometrics device to the directory or database housing
the authentication credentials. Some biometrics readers are on USB keys or tokens that connect
to the computer. These devices should provide encryption.
Either at rest or in transit, the key to protecting biometric data is encryption and then secure
storage in a directory service such as AD or LDAP.
5. Organizations need to take pro-active steps to define the accetable use of portable storage
devices like USB flash drives within the environment and then put the tools and technology in
place to help monitor and enforce the policy and protect the network and data from the risk
caused by USB flash drives. Many organizations have an acceptable use policy defined, which
users must agree to. The Acceptable Use Policy (AUP) essentially defines how users are allowed
to use the internet, e-mail, telephones and other cmmunications and network resources.
The Group policy is an effective tool for computer on the network and enforcing the security
policies.

More Related Content

Similar to 1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf

Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
Types of Networks  Week7 Part4-IS RevisionSu2013 .docxTypes of Networks  Week7 Part4-IS RevisionSu2013 .docx
Types of Networks Week7 Part4-IS RevisionSu2013 .docxwillcoxjanay
 
Securing Nuclear Facilities
Securing Nuclear FacilitiesSecuring Nuclear Facilities
Securing Nuclear FacilitiesOPSWAT
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfamitkhanna2070
 
Network security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfNetwork security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfaquazac
 
The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443WoMaster
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...SubmissionResearchpa
 
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...IOSR Journals
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber lawDivyank Jindal
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET Journal
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challengexKinAnx
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfezzAyman1
 
RFC 2196 Site Security Handbook
RFC 2196 Site Security HandbookRFC 2196 Site Security Handbook
RFC 2196 Site Security HandbookDavid Sweigert
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxcuddietheresa
 

Similar to 1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf (20)

Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
B018211016
B018211016B018211016
B018211016
 
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
Types of Networks  Week7 Part4-IS RevisionSu2013 .docxTypes of Networks  Week7 Part4-IS RevisionSu2013 .docx
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
 
Securing Nuclear Facilities
Securing Nuclear FacilitiesSecuring Nuclear Facilities
Securing Nuclear Facilities
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
 
Network security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfNetwork security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdf
 
Master Class Cyber Compliance
Master Class Cyber Compliance Master Class Cyber Compliance
Master Class Cyber Compliance
 
The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...
 
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 
PROJECT REPORT.docx
PROJECT REPORT.docxPROJECT REPORT.docx
PROJECT REPORT.docx
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
 
CSEC630 individaul assign
CSEC630 individaul assignCSEC630 individaul assign
CSEC630 individaul assign
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdf
 
RFC 2196 Site Security Handbook
RFC 2196 Site Security HandbookRFC 2196 Site Security Handbook
RFC 2196 Site Security Handbook
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 

More from info382133

1.) Main characteristics of Haloarchaea are as followsHalophiles .pdf
1.) Main characteristics of Haloarchaea are as followsHalophiles .pdf1.) Main characteristics of Haloarchaea are as followsHalophiles .pdf
1.) Main characteristics of Haloarchaea are as followsHalophiles .pdfinfo382133
 
1. The three bacteria that may be implicated in the given case are S.pdf
1. The three bacteria that may be implicated in the given case are S.pdf1. The three bacteria that may be implicated in the given case are S.pdf
1. The three bacteria that may be implicated in the given case are S.pdfinfo382133
 
1. Activation of Vit. D involves Kidney and Liver and liver is part .pdf
1. Activation of Vit. D involves Kidney and Liver and liver is part .pdf1. Activation of Vit. D involves Kidney and Liver and liver is part .pdf
1. Activation of Vit. D involves Kidney and Liver and liver is part .pdfinfo382133
 
Rf = (distance the spot traveled)L there are fou.pdf
                     Rf = (distance the spot traveled)L there are fou.pdf                     Rf = (distance the spot traveled)L there are fou.pdf
Rf = (distance the spot traveled)L there are fou.pdfinfo382133
 
No. Since sodium chloride is an ionic compound, i.pdf
                     No. Since sodium chloride is an ionic compound, i.pdf                     No. Since sodium chloride is an ionic compound, i.pdf
No. Since sodium chloride is an ionic compound, i.pdfinfo382133
 
Nacl is highly ionic in nature. where as CaO is s.pdf
                     Nacl is highly ionic in nature. where as CaO is s.pdf                     Nacl is highly ionic in nature. where as CaO is s.pdf
Nacl is highly ionic in nature. where as CaO is s.pdfinfo382133
 
it is reduced as it accepts e- and goes from 0 to.pdf
                     it is reduced as it accepts e- and goes from 0 to.pdf                     it is reduced as it accepts e- and goes from 0 to.pdf
it is reduced as it accepts e- and goes from 0 to.pdfinfo382133
 
Iodine test is used to see if a compound has star.pdf
                     Iodine test is used to see if a compound has star.pdf                     Iodine test is used to see if a compound has star.pdf
Iodine test is used to see if a compound has star.pdfinfo382133
 
I have no clue! .pdf
                     I have no clue!                                  .pdf                     I have no clue!                                  .pdf
I have no clue! .pdfinfo382133
 
C only III is major product .pdf
                     C only III is major product                      .pdf                     C only III is major product                      .pdf
C only III is major product .pdfinfo382133
 
Borane-THF is flammable and highly reactive with .pdf
                     Borane-THF is flammable and highly reactive with .pdf                     Borane-THF is flammable and highly reactive with .pdf
Borane-THF is flammable and highly reactive with .pdfinfo382133
 
Ubiquity Internet is available everywhere namely at home, at work v.pdf
Ubiquity Internet is available everywhere namely at home, at work v.pdfUbiquity Internet is available everywhere namely at home, at work v.pdf
Ubiquity Internet is available everywhere namely at home, at work v.pdfinfo382133
 
Water is the most used resource in our day to day life . When the wa.pdf
Water is the most used resource in our day to day life . When the wa.pdfWater is the most used resource in our day to day life . When the wa.pdf
Water is the most used resource in our day to day life . When the wa.pdfinfo382133
 
The initiation of the sporulation of the bacteria is a complex cellu.pdf
The initiation of the sporulation of the bacteria is a complex cellu.pdfThe initiation of the sporulation of the bacteria is a complex cellu.pdf
The initiation of the sporulation of the bacteria is a complex cellu.pdfinfo382133
 
The emissivity of a given surface is the measure of its ability to e.pdf
The emissivity of a given surface is the measure of its ability to e.pdfThe emissivity of a given surface is the measure of its ability to e.pdf
The emissivity of a given surface is the measure of its ability to e.pdfinfo382133
 
Power set={SolutionPower set={.pdf
Power set={SolutionPower set={.pdfPower set={SolutionPower set={.pdf
Power set={SolutionPower set={.pdfinfo382133
 
bro Solutionbro .pdf
bro Solutionbro .pdfbro Solutionbro .pdf
bro Solutionbro .pdfinfo382133
 
ANSWER Accounting concepts and conventions In dr.pdf
                     ANSWER Accounting concepts and conventions  In dr.pdf                     ANSWER Accounting concepts and conventions  In dr.pdf
ANSWER Accounting concepts and conventions In dr.pdfinfo382133
 
As ions are charged species a strong interactions.pdf
                     As ions are charged species a strong interactions.pdf                     As ions are charged species a strong interactions.pdf
As ions are charged species a strong interactions.pdfinfo382133
 
SCADA Networks is a supervisory control data acquisition network con.pdf
SCADA Networks is a supervisory control data acquisition network con.pdfSCADA Networks is a supervisory control data acquisition network con.pdf
SCADA Networks is a supervisory control data acquisition network con.pdfinfo382133
 

More from info382133 (20)

1.) Main characteristics of Haloarchaea are as followsHalophiles .pdf
1.) Main characteristics of Haloarchaea are as followsHalophiles .pdf1.) Main characteristics of Haloarchaea are as followsHalophiles .pdf
1.) Main characteristics of Haloarchaea are as followsHalophiles .pdf
 
1. The three bacteria that may be implicated in the given case are S.pdf
1. The three bacteria that may be implicated in the given case are S.pdf1. The three bacteria that may be implicated in the given case are S.pdf
1. The three bacteria that may be implicated in the given case are S.pdf
 
1. Activation of Vit. D involves Kidney and Liver and liver is part .pdf
1. Activation of Vit. D involves Kidney and Liver and liver is part .pdf1. Activation of Vit. D involves Kidney and Liver and liver is part .pdf
1. Activation of Vit. D involves Kidney and Liver and liver is part .pdf
 
Rf = (distance the spot traveled)L there are fou.pdf
                     Rf = (distance the spot traveled)L there are fou.pdf                     Rf = (distance the spot traveled)L there are fou.pdf
Rf = (distance the spot traveled)L there are fou.pdf
 
No. Since sodium chloride is an ionic compound, i.pdf
                     No. Since sodium chloride is an ionic compound, i.pdf                     No. Since sodium chloride is an ionic compound, i.pdf
No. Since sodium chloride is an ionic compound, i.pdf
 
Nacl is highly ionic in nature. where as CaO is s.pdf
                     Nacl is highly ionic in nature. where as CaO is s.pdf                     Nacl is highly ionic in nature. where as CaO is s.pdf
Nacl is highly ionic in nature. where as CaO is s.pdf
 
it is reduced as it accepts e- and goes from 0 to.pdf
                     it is reduced as it accepts e- and goes from 0 to.pdf                     it is reduced as it accepts e- and goes from 0 to.pdf
it is reduced as it accepts e- and goes from 0 to.pdf
 
Iodine test is used to see if a compound has star.pdf
                     Iodine test is used to see if a compound has star.pdf                     Iodine test is used to see if a compound has star.pdf
Iodine test is used to see if a compound has star.pdf
 
I have no clue! .pdf
                     I have no clue!                                  .pdf                     I have no clue!                                  .pdf
I have no clue! .pdf
 
C only III is major product .pdf
                     C only III is major product                      .pdf                     C only III is major product                      .pdf
C only III is major product .pdf
 
Borane-THF is flammable and highly reactive with .pdf
                     Borane-THF is flammable and highly reactive with .pdf                     Borane-THF is flammable and highly reactive with .pdf
Borane-THF is flammable and highly reactive with .pdf
 
Ubiquity Internet is available everywhere namely at home, at work v.pdf
Ubiquity Internet is available everywhere namely at home, at work v.pdfUbiquity Internet is available everywhere namely at home, at work v.pdf
Ubiquity Internet is available everywhere namely at home, at work v.pdf
 
Water is the most used resource in our day to day life . When the wa.pdf
Water is the most used resource in our day to day life . When the wa.pdfWater is the most used resource in our day to day life . When the wa.pdf
Water is the most used resource in our day to day life . When the wa.pdf
 
The initiation of the sporulation of the bacteria is a complex cellu.pdf
The initiation of the sporulation of the bacteria is a complex cellu.pdfThe initiation of the sporulation of the bacteria is a complex cellu.pdf
The initiation of the sporulation of the bacteria is a complex cellu.pdf
 
The emissivity of a given surface is the measure of its ability to e.pdf
The emissivity of a given surface is the measure of its ability to e.pdfThe emissivity of a given surface is the measure of its ability to e.pdf
The emissivity of a given surface is the measure of its ability to e.pdf
 
Power set={SolutionPower set={.pdf
Power set={SolutionPower set={.pdfPower set={SolutionPower set={.pdf
Power set={SolutionPower set={.pdf
 
bro Solutionbro .pdf
bro Solutionbro .pdfbro Solutionbro .pdf
bro Solutionbro .pdf
 
ANSWER Accounting concepts and conventions In dr.pdf
                     ANSWER Accounting concepts and conventions  In dr.pdf                     ANSWER Accounting concepts and conventions  In dr.pdf
ANSWER Accounting concepts and conventions In dr.pdf
 
As ions are charged species a strong interactions.pdf
                     As ions are charged species a strong interactions.pdf                     As ions are charged species a strong interactions.pdf
As ions are charged species a strong interactions.pdf
 
SCADA Networks is a supervisory control data acquisition network con.pdf
SCADA Networks is a supervisory control data acquisition network con.pdfSCADA Networks is a supervisory control data acquisition network con.pdf
SCADA Networks is a supervisory control data acquisition network con.pdf
 

Recently uploaded

Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 

Recently uploaded (20)

Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 

1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf

  • 1. 1. Pros and Cons of IP CCTV: New threats are introduced to the security world as systems migrate from traditional analogue to IP network-enabled systems particularly in video surveillance. Internet Protocol (IP) provide an open platform for integration at the data level of multiple security and life safety devices and applications. Pros: Lower initial cost: Harnissing the IT infrastructure reduces installation costs in cabling, associated containment and power outlets. Wide-spread compatibility Provides flexibility and scalability Higher security and resilience The tight software integraion between systems make them more intelligent and reduces security gaps, speed up the response time. Cons: It revolves arond network security and hackers threat. The risk increases if camera is accesses from the mobile or phone. Threat to the security industry and thus security from the IT sector. 2. 3. User education about security: It is one of the hardest security layers for administrators to implement.Some of the tips are: 4. There are many problems associated with the boimetrics like fingerprints, iris patterns, face scan, voice recognization. Make sure that the biometric data is a sensitive data compared to others and is encrypted in transit from the biometrics device to the directory or database housing the authentication credentials. Some biometrics readers are on USB keys or tokens that connect to the computer. These devices should provide encryption. Either at rest or in transit, the key to protecting biometric data is encryption and then secure storage in a directory service such as AD or LDAP. 5. Organizations need to take pro-active steps to define the accetable use of portable storage devices like USB flash drives within the environment and then put the tools and technology in place to help monitor and enforce the policy and protect the network and data from the risk caused by USB flash drives. Many organizations have an acceptable use policy defined, which users must agree to. The Acceptable Use Policy (AUP) essentially defines how users are allowed to use the internet, e-mail, telephones and other cmmunications and network resources. The Group policy is an effective tool for computer on the network and enforcing the security policies.
  • 2. Solution 1. Pros and Cons of IP CCTV: New threats are introduced to the security world as systems migrate from traditional analogue to IP network-enabled systems particularly in video surveillance. Internet Protocol (IP) provide an open platform for integration at the data level of multiple security and life safety devices and applications. Pros: Lower initial cost: Harnissing the IT infrastructure reduces installation costs in cabling, associated containment and power outlets. Wide-spread compatibility Provides flexibility and scalability Higher security and resilience The tight software integraion between systems make them more intelligent and reduces security gaps, speed up the response time. Cons: It revolves arond network security and hackers threat. The risk increases if camera is accesses from the mobile or phone. Threat to the security industry and thus security from the IT sector. 2. 3. User education about security: It is one of the hardest security layers for administrators to implement.Some of the tips are: 4. There are many problems associated with the boimetrics like fingerprints, iris patterns, face scan, voice recognization. Make sure that the biometric data is a sensitive data compared to others and is encrypted in transit from the biometrics device to the directory or database housing the authentication credentials. Some biometrics readers are on USB keys or tokens that connect to the computer. These devices should provide encryption. Either at rest or in transit, the key to protecting biometric data is encryption and then secure storage in a directory service such as AD or LDAP. 5. Organizations need to take pro-active steps to define the accetable use of portable storage devices like USB flash drives within the environment and then put the tools and technology in place to help monitor and enforce the policy and protect the network and data from the risk caused by USB flash drives. Many organizations have an acceptable use policy defined, which users must agree to. The Acceptable Use Policy (AUP) essentially defines how users are allowed to use the internet, e-mail, telephones and other cmmunications and network resources.
  • 3. The Group policy is an effective tool for computer on the network and enforcing the security policies.