A Balancing Act

A Balancing Act

Cybersecurity takes a look at availability and protection

Energy security, access to the electrical grid and police and fire safety are just a handful of the networked services that we take for granted and rely upon on a daily basis. Every second of every day, sensors are digitizing the real world, creating information and transporting it across multiple networks and interfaces to a broadening audience.

While there is obvious utility being gleaned from this process, from our vantage point here in the physical security space, information sharing and transmission raises issues we have to consider: what happens to this information inside those organizations, and what risks are presented by increasing the communication in and out of these organizations in the name of utility?

In a world where convenience and anytime availability can make or break a business, information availability and always-on connectivity are here to stay. Much as the Industrial Revolution brought key innovations and new challenges, this new Information Revolution is shaking up the accepted paradigms. The explosion of demand for mobile access to information and increased opportunities for interconnectivity are a fact of life, both at home and for business. We can use security information to answer questions such as: How efficient are your delivery routes? What cameras saw the guy with the red shirt? Is that the UPS delivery man at the door?

High-risk Organization

Interconnectivity and high data availability also represent high risk for organizations that are concerned about threats to their information security. A hunger for more information upon which to base decisions and actions is driving the proliferation of big data, video analytics, cloud storage and Internet of Things deployments, while ratcheting up our risk profiles and the potential for cyber-attack.

ONVIF’s mission is to establish a common communication interface for all security devices and clients, across security disciplines, systems and vendors. While ONVIF does not set security policy, what many people don’t realize is that industry proven cybersecurity measures can be included in the common interface established by ONVIF. Among these are Certificate Based Client Authentication, Keystores and TLS Servers. There are also best practices that can be encouraged, such as forcing a default password change or out of the box hardening. ONVIF and other standards groups can help ensure and deploy real-time security by including these established cyber security measures in their Profiles and standards.

The establishment of a common interface by ONVIF and other standards organizations helps to bring awareness about the capabilities of standards in this area and enables manufacturing companies to invest once in this approach rather than continually developing proprietary products and unique interfaces to integrate with other devices. Safe/smart city deployments and Internet of Things systems are helping to accelerate acceptance of interoperability over proprietary systems.

In fact, it’s estimated that as many as 50 billion IoT devices will be connected to a network over the next three years, all requiring some measure of interoperability. If you’re concerned about the security of information, that number can seem alarmingly high. The good news is that IoT security budgets are also expected to increase substantially over the next three years and there some changes that we, as an industry, can proactively make in the meantime.

Be Cyber Secure

Remember that a single device or product alone cannot be cybersecure if it’s connected to an unsecured network or to a network with other vulnerable devices. People, products and processes — these three elements together can provide security, but if you don’t have sound cybersecurity practices in place for all three, you won’t have complete security.

Manufacturers of physical security products can use encryption technology to help harden IoT devices. They can ship products with default settings that require end users to change the default password on install and that also require password changes periodically. It’s also worth exploring whether some settings on devices should be locked down to protect our customers, for example making encryption part of the factory settings, increasing the likelihood that encryption is left enabled on the device.

End users and system integrators also have some responsibility to bear. Approximately 95 percent of the security breaches that occur today are due to some sort of simple password error or lack of organizational policies with respect to password management. It takes only a matter of seconds to very quickly choose a simple, easy to remember password. However, relying on the most convenient solution — often the default password — can most definitely increase the potential for compromised access to our most private information.

As is the case with many things, a balancing act is required when it comes to information availability and securing access to that information. Each end user and system integrator has to find the right balance between availability of data and protection of that data, taking cost into consideration as well.

Strong user authentication, event monitoring, activity logging, encryption of data and other controls that are built into our IT networks go a long way in increasing cyber security. Using standards like those offered by ONVIF may actually be the key to having the best of both worlds: the ability to share information with other devices using standardized, encrypted communications.

This article originally appeared in the February 2018 issue of Security Today.

Featured

  • Report Reveals Security Training Reduces Global Phishing Click Rates by 86%

    KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, today launched its “Phishing by Industry Benchmarking Report 2025” which measures an organization’s Phish-prone Percentage (PPP) — the percentage of employees likely to fall for social engineering or phishing attacks, indicating the organization’s overall susceptibility to phishing threats. This year’s report found a global average baseline PPP of 33.1%, meaning a third of employees interact with phishing simulations before taking part in best-practice security awareness training (SAT).COVER 2025-PIB-NA-Report_EN-US Read Now

  • TSA Begins REAL ID Full Enforcement Today

    Today, the Transportation Security Administration (TSA) announced the imminent implementation of its REAL ID enforcement measures at TSA checkpoints nationwide. Read Now

  • Body-Worn Cameras on the Rise

    On the evening of Oct. 29, 2024, the owner of 300 Guard based in Houston, was shot while on duty at a convenience store. He returned fire. He was wearing a plated vest and thankfully recovered in the hospital. Read Now

  • Brazil Port Enhances Surveillance and Supports Wildlife Conservation with Sustainable Technology

    Ferroport, which operates the iron ore terminal at the Port of Açu in São João da Barra, Rio de Janeiro, Brazil, has deployed state-of-the-art video surveillance cameras from Axis Communications to enhance nighttime security and visibility, while decreasing environmental impact and prioritizing sustainability. With cutting-edge technology, the port now has precise surveillance cameras that capture high-quality nighttime images, while reducing the amount of artificial lighting that negatively impacts the surrounding ecosystem. Read Now

  • Fast-Forward from 1,000 B.C.E. to Today

    The lock and key have been around since time immemorial. In fact, the locksmith profession is one of the oldest in the world when you consider the earliest wooden tumbler lock debuted three-plus millennia ago. Read Now

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.