Locking Down Network Connections

Author: Ethan Ace, Published on May 02, 2012

Cameras and access control panels are gateways for hackers. Locating these devices throughout a building gives attackers multiple points of entry, many without any form of physical or network security. However, physical connections to the network may be secured with RJ45 locks. In this note, we look at these products, differing styles, and what sort of protection they may provide to a security network installation.

Overview

**** ***** *** ********* *** **** ***** ****** *** ***** ports, ********* ** *** **** *********, *** **** **** ***********:

  • ***** ***** ***** ***** **** *** ***** *** *********, ********* beneath *** ******* ****'* ******* ***. **** *******, *** *** cannot ** ****** **** ** ****** *** *****, ******* ***** disengaging *** ****. **** ***** ********** ******* *** ****** *** to ******* ********* ********* ** ********. ****** ***** ** *******, but ********** ** ***** ** ********* ****** **** ** *** tab ******* ** *** ****, ** *** ***** *** ***** not ** *******.
  • ******* ***** *** **** ****** **** *****, ******* ** * wall *****, ***** *****, ** ******. **** *******, * ***** tab ******* ** **** *** **** **** *****. ***** *** typically ***-*******, ** ***** ********* ********* **** ******** *** **** with *****, **** ** ****** ** ****-***** ** ****** **.

******** ************* ******* ***** ***** *** **** *****, ** ******* styles, ********* ************ ******, *** ** ********. ***-********** ***** ****** ******** **** ******* ********** *** **** available. **** **** *** **** ***** **** *** * ***** $*-* *** ******, ********* **** ** **** ** ** ** **.

**** ****** ***** *********** ******* ***** ***** *** ******* ***** (Black *** *****), *** ***** ********** *****:

Removal *****

***** ***** ******* *********** ***** *** ********* ** ******** ** a *******. **** ***** *** ******** ***** ** **** ****, or **** ***** **** ***** ************, *** ** ***** *** easy ** **** **, *** **** ******* **** * ******* level ** ********. ***** *** ***** ** ** *** **** security ** *** *** **** *******, *** ********** ******* ** still * *****.

*********** ******* ***** *** *********** * ******** ** ***** ***** locks. *** *********** *** *** ******* ** ******* * ****** must ***** * **** **** ****, ** **** ** *** of ******** *** *****. * **** *** ** **** **** someone ** ****, ** ****, ** * **********, *** **** opens ** *** ****** ** *********. **** ****, *******, ***** see *** **** ** ******* **** ** ***** *******, *** this ******* **** ** ** *****. *********** ***** *** *********** or ****, *** ******** **** **** *** ***** ** ** additional ******.

**** ***** ***** *** **** ** *********** **** ************/******* ****, in **** **** *******:

Should *** *** ****?

***** ***** *** ****, **** ***** *** * ********** ********** in **** ************. **** ** ******** ** *** * *******, they *** ** **** ** ******* ********** ************* ** *******, servers, *** ***** *******. ** ************* ***** ***** * ******* with ***** ********, **** *** ** ********** ******, ** ***** may ****** ****** * ******** *****, ********* ** *** ******* device.

* ***** ********** ******** **** **** * *** ** ****** these *****, ****** **** ******* * ***** ** ********** ******* less ************* ******* ** ********** *******. ** *** **** *****'* use *********** *****, ** ** ****** ****** ** ****** *** what ** ****** ** ****** **. **** ** ** **** use *********** *****, ********, ******* ****, ** ******** *** ***** remove *** **** ********** *******, ****** **** ******* **** ********** motions *** **** *********** *****. ** *** **** *****, ***** truly ******* ** **** ****** ** * ***** ***** *** find * *** ** ****** *** ** *** **-********* **, which **** ** ********** ** **** ********. *** ***** *******, cable ***** *** ***** *** *********** ** **** *** ***** of ******** ** ******* * ******* ** ********** *** *****.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Directory of 40 IP Camera Manufacturer Discovery Tools on Jun 19, 2017
Locating the IP address of a DHCP client or factory defaulted device on a network is often a difficult task.  In another report, we discussed...
Bluebeam Revu Security Floorplan Estimation App Test on Jun 15, 2017
Bluebeam Revu is a construction design markup tool that claims it is "used by 94% of top US contractors", but what role does it have for physical...
How Integrators Use IPVM on May 24, 2017
150 integrators explained how they use IPVM and how it helps them stay informed and improve their business.  The 4 main uses integrators cited for...
Smartphone Controlled Kevo Lock Tested on May 04, 2017
Smartlocks are a growing market, with millions sold. Kwikset's Kevo is one of the most common choices, using the Unikey smart phone access control...
Last Day - IP Networking Course May 2017 on Apr 26, 2017
Today is the last day to register for the May IP Networking Course. This is the only networking course designed specifically for video...
IPVM First Dean's List W2017 - Thomas Atkinson, Matt Hurly and Fredrik Lundqvist on Apr 24, 2017
IPVM is happy to congratulate and celebrate our first "Dean's List", the top students in our courses. For the Winter 2017 IP Networking course...
Cap Connector "You Can't Screw Up" Profile on Mar 31, 2017
One company, CaP Connectors, is marketing their coax connectors as “The 30-second Connector You Can’t Screw Up”, by claiming to combine the best...
DDNS vs P2P vs VPN Usage Statistics on Mar 30, 2017
Cyber security concerns are escalating, even in the video surveillance industry which has historically lagged in its attention here. A key...
2Gig Intrusion Megatest (GC2 & GC3 Panels Tested) on Mar 28, 2017
2Gig is one of the most widely used intrusion systems, with two product lines that are the main offering of many alarm companies, huge national...
Lock Keyways For Access Control Guide on Mar 23, 2017
Lock keyways can be the difference between a lock working or not. Understanding keyways is important for access control. Indeed, a member recently...

Most Recent Industry Reports

Security Robots Are Just Entertainment on Jul 21, 2017
Great entertainment, no real security value.  That is the happy (or sad) state of security robots in 2017. Knightscope robot's drowning, the...
Wireless Burglar Alarm Sensors Guide on Jul 21, 2017
Wireless sensors for burglar alarm sensors are an increasingly common option for the historical labor intensive wired alarm systems. However,...
Competing Against ADT on Jul 20, 2017
ADT is one of the biggest players in the security industry, with ~$4 billion revenue. In 2017, they were acquired / merged with Protection...
Hikvision Launching Deep Learning Recorders on Jul 20, 2017
Hikvision has become a common choice for super low cost NVRs. Now, Hikvision is aiming to move up market, with deep learning NVRs that claim far...
PR Campaign Exploiting Manufacturer Cybersecurity on Jul 20, 2017
Manufacturers increasingly have a bulls-eye on their back. As cyber security solutions providers grow, they realize a great way to get publicity...
Axis Door Station Tested (A8105-E) on Jul 19, 2017
Axis continues their push into niche markets, especially audio, with network speakers, an IP horn, and video door stations. We bought and tested...
Manufacturer Favorability Guide on Jul 19, 2017
This 120 page PDF guide may be downloaded inside by all IPVM members. It includes our 20 manufacturer favorability rankings and 20 manufacturer...
$8 Billion Utility Georgia Power Enters Surveillance Business Offering Avigilon And Genetec on Jul 19, 2017
Utilities are typically considered major customers of surveillance integrators but one utility, Georgia Power, with $8+ billion in annual revenue...
Knightscope Laughs off Robot Drowning on Jul 18, 2017
A day after a Knightscope robot drowned, Knightscope has issued an 'official statement' making fun of the issue: The implied message is that...
Microsoft Video AI Cloud Services Examined on Jul 18, 2017
Microsoft has released one of the most amazing video analytics marketing videos ever. In it, they detect oil spills, track individual people giving...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact