The issue of intrusive cyber events has come up more and more these days and yet I still see/hear of systems with open ports, factory passwords and other issues that concerns me considerably. Quite frankly, I do not feel comfortable with my level of knowledge about the subject.
Axis provides a reasonably readable Hardening Guide. I have not seen this guide for other manufacturers. Anyone know of other manufacturers who provide this? To the integrator out there, what guides do you use? Is there a software application that one could run on their system to audit the system for vulnerabilities (i.e. unused ports, streams, password setting, etc) that can audit a system for these vulnerabilities?
** - ** *** ** *** feel *********** * ******** ********** ** internal ******** ***** ** * **** investment.
** ***** ******** **** ********* ** our************* *** ** ***** ************ *****, ***** ******** *** ********* ********:
*** *** **** **** ** ***** with **** ********* ************ ** *** if ***** *** ********** ******** *** can **** ********* **; *.*: *** an ********** ~$*** *** **** ********* provides ********** **** ******** (****** **** vary):
**** ******* ** **** ***** ***** out *** ****** ******** ****** *** ***** ************, *** *** ******* ** **** forwarding. *** ***** *** ** ***** what ***** *** **** ** **** networks ******* ****** ** ****.
****** ***** ********** *** ***** *** may **** **** ** *** **** to ******* *** ******* ****** ********* your ******* *********. ** ***** **** in ****** ** ********** ********** *** ***** ************. *** **** ******* ****** **** there *** ******* ** ****** ********* pass * ********* *********; *.*. ******, processor, ********* ** ***** ****** ********* utilization ***** *** *** ******* ** email ***/** **** ************.