Getting A Hold On The Bandwith
- By Ralph C. Jensen
- Nov 01, 2017
More than a decade ago, it was all about analog cameras. My, how times have
changed. By 2010, IP-based cameras were taking over the security duties, and
doing a good job, but there were challenges.
Among concerns was protecting the network from remote hackers from anywhere in
the world. With the right knowledge, the right person (I mean the wrong person) could
access the system. A robust network means security software is constantly being updated
to protect against new threats all the time. Another concern is bandwidth capacity.
Our cover story in this issue is from Brian Simmons, Berk-Tek, who writes that as image
storage and increased resolution of cameras grow, more bandwidth is consumed to
meet demands. Simmons writes about what new HD and UHD technologies have been
incorporated into video surveillance.
Simmons writes about several factors that can affect bandwidth requirements, such
as resolution, frame rate, streaming mode, compression and network protocols. Finally,
Simmons writes about structured cabling recommendations. There is a ton of information
packed into this story.
Andrew Deen, a freelance writer based in San Diego, writes
about seven ways criminals are making money from cybercrime.
Believe it or not, cybercrime comes in a variety for shapes and
sizes. This includes data breaches, selling illegal goods, Bitcoin
and the dark web, tax fraud, identity theft and using counterfeit
money. Oh, and cyber criminals are not limiting fraud to coins and
bills; it also comes in the form of medical, personal or financial
Are we completely immune to cyber-criminal activity?
No. There is no way to be completely protected, but be
careful what’s on the network.Be smart.
This article originally appeared in the November 2017 issue of Security Today.
Ralph C. Jensen is the Publisher of Security Today magazine.