Tackling Cybersecurity Challenges in the Age of IoT

Tackling Cybersecurity Challenges in the Age of IoT

With the rapid adoption of the Internet of Things (IoT), we are moving towards an entirely interconnected world, from smart organizations to smart cities. No one can disagree with the power that IoT presents. However, as we become more and more reliant on web-based services and connected devices, we run the risk of making ourselves more vulnerable than ever, if we fail to recognize the importance of cybersecurity in relation to IoT.

According to the technology research firm Gartner, more than 25% of cyber-attacks will involve IoT by 2020. The cyber-attacks on the FBI and American Department of Homeland Security in early 2016 are harsh reminders that cybersecurity is a very real and pressing concern, regardless of the size of the organization. Unfortunately, this trend isn’t set to slowdown as many organizations still have a long way to go to make sure their physical security systems are truly secure.

Trust Issues

The deployment of internet connected devices, including IP security cameras, needs to be strategically thought out together with wide-scale collaboration, responsibility, openness, accessibility and most of all trust between all relevant parties - manufacturers, systems integrators, consultants, IT departments and cybersecurity specialists.

Without adequate security, these connected devices provide a gateway into personal, corporate, and governmental networks where confidential data can be stolen or vicious malware planted.

While companies are painfully aware of the importance of cybersecurity, in practice they are still not vigilant enough in regularly reviewing and enhancing industry security standards and practices to protect both themselves and their clients in an increasingly complex and threating environment.

The cybersecurity incidents that keep occurring are most often associated with products designed to provide maximum convenience to the customer, even if it meant loosening security policies (non-complex password setting policy, remote access and support capability). While providing convenience to customers, the security industry needs to implement the right level of security policies that protect our customers’ information. We are finally seeing these changes taking place across the industry as end users are increasingly reluctant to buy products from manufacturers whose products have been compromised through recent vulnerability incidents.

Keeping the Bad Guys Out

As with any software solution that resides on a network, security systems and edge devices are susceptible to a variety of attacks. Hacking a security system can take any number of forms, including brute-force, packet-sniffing, and man-in-the-middle attacks. In some cases, particularly with man-in-the-middle attacks, hackers are able to “listen in” and alter communication that the participants believe is secure.

When it comes to protecting your cameras from unwanted attacks, there are a number of steps you can take. From changing password defaults and using authentication to proper network set up and configuration to knowing how to identify and thwart attacks, there are true and tested solutions for securing all aspects of your physical security system.

When choosing an IP-based security solution, it is crucial to scrutinize and evaluate the manufacturer’s cybersecurity policies—what are their principles and practices? Do the built-in security mechanisms offered in their solutions use multi-layered encrypted communications, data protection capabilities, and strong user authentication and password protection? How hardened are the physical components inside the device? These measures help protect organizations and their customers against malicious attacks. They also ensure only those with defined privileges will be able to access or use resources, data and applications.

Without proper protection, the size, scope and severity of cyber threats and attacks will likely increase over time. But there are solutions. While the advancement of technology has the potential to increase system vulnerability, it also carries with it the ability to protect. At Hanwha, we are committed to working with our customers to ensure that our innovation delivers the best possible protection now and in the future. After all, security is what we do.

How to Get Better Educated

Professionals can get information from manufacturers such as Hanwha, to educate themselves on network hardening, and closing vulnerabilities. Hanwha offers white papers, seminars and training on cybersecurity. Additionally, various forms of media available in the public domain can help professionals gain a stronger understanding on best practices for establishing security policies. Relevant educational facilities and programs are hard to find but they are helpful in understanding the latest industry and cybersecurity trends at various security seminars / conferences.

The Hanwha Difference

At Hanwha, we take cybersecurity very seriously. We have a large team of engineers in our Korean R&D center dedicated to cybersecurity to ensure products meet our high standards and to investigate field concerns or newly discovered issues. This allows us to respond quickly, release patch fixes, and address any security vulnerabilities. Our website has a dedicated landing page for cybersecurity, which includes our Security Vulnerability Disclosure Policy, as well as reports clearly documenting any vulnerabilities discovered and the corrective actions to secure the devices.

We conduct tests on our network products using one of the leading 3rd party companies in penetration testing. We routinely monitor and diagnose our products to strengthen security and minimize vulnerabilities while managing product passwords, protocols and algorithms.

Our best practices include: ensuring proven encryption algorithms and secure coding is used, the removal of unused services and daemons, not using backdoors, the removal of default passwords, password guessing locks, firmware encryption and more. We have also updated many of our factory default settings to harden our devices even further. 

In addition, we have published a cybersecurity hardening guide and white paper to describe best practices in securing network products.  We regularly conduct trainings and webinars on cybersecurity for end users and system integrators to ensure they understand best practices.

We develop the mission critical parts of our products ourselves from the camera optics to our own chipsets, so we can ensure higher levels of quality control and ultimately increase security for our customers. A core benefit for us is our Wisenet SoC (system on a chip) that we continually develop specifically for our security cameras. We are not as reliant on off-the-shelf, potentially vulnerable, components and technology, compared to competing vendors. We also have active education/training programs for our systems integrators and partners, and have recently launched a new Wisenet certification program which contains a focused section on cybersecurity.

Conclusion

The very devices that are designed to protect customers' property and personal information are increasingly used as a means of seizing sensitive personal and corporate information. It is important not to view cybersecurity as just one person’s or one department’s job: it is a collective responsibility that needs to be taken seriously by every single one of us, including manufacturers, systems integrators and end users. As security professionals, we all need to be confident that our systems are secure from both a physical and a cyber perspective. To build this confidence, systems integrators and end users should partner with trusted companies and vendors that have strong cyber security policies, dedicated resources, and a clearly articulated plan for combating security vulnerabilities.

Employing these best practices not only can prevent networked video devices and systems from serving as entry points, but also ensures the integrity and continued operation of this critical function – ensuring the ongoing safety and security of people and assets.

If you like what you see, get more delivered to your inbox weekly.
Click here to subscribe to our free premium content.

comments powered by Disqus

Digital Edition

  • Security Today Magazine - October 2018

    October 2018

    Featuring:

    • Streamlined for Success
    • Making Your Expertise Unique
    • An Eye on the Campus
    • Solving Problems
    • Enhancing Security

    View This Issue

  • Environmental Protection
  • Occupational Health & Safety
  • Infrastructure Solutions Group
  • School Planning & Managmenet
  • College Planning & Management
  • Campus Security & Life Safety