Skip ahead to the 4m mark for IP cameras.
How Easy Is It To Hack IP Cameras And IOT Devices?
Well hes wrong on one thing. As "IP security camera systems" are built now if you lock the device from failed attempts you lose the video stream to your recording devices( as they use the same authentication methods for login and video feeds) unless you are rocking internal storage on your IP cameras that would be dumbest thing you could do is to implement a failed login lockout function as knocking your IP camera system out would just involve spamming fail passwords .
Now for DVR's and NVR's this would be a great feature as you could limit it to an Physical port on the NVR or DVR's and lock out that port and let the cameras use another or other ports available.
while I agree IP cameras are behind in development for the full Irony effect of "internet security" you also can not lump it in with Smartphones and desktop computers either. If they are close to any anthing they would classify more as servers than anything else
but to answer your question depends on the camera install and setup, and the skill of the hacker.
want to watch "real" attempts to hack cameras? watch this one
https://www.youtube.com/watch?v=B8DjTcANBx0
much more realistic problems to address.
You are referring to a DoS created by refusing too many incorrect password guesses. Some camera manufacturers have already figured this out, and if too many incorrect guesses happen within a certain time period, it will block all unauthenticated connections/attemps for a specified amount of time.
That being said, already authenticated sessions, such as a camera streaming to a VMS or NVR will continue. This prevents a true DoS attack from taking place, while preventing password guessing attempts.
Ask questions and get answers to your physical security questions from IPVM team members and fellow subscribers.