Network Security Concerns Examined

Author: John Honovich, Published on Nov 05, 2009

At an ISC West 2009 presentation, Slayton Solutions spoke in detail on the vulnerabilities of network security while using some highly uncommon situational examples that may exaggerate real life risks. [Note: view slides from presentation].

The presentation provided an introductory study of network security topics like attack techniques, hacking tools, type of attacks, and preventative security options. 

**** *** ****** ********* ****: 

  • *** ******** ** ******* ******* * ***** ****** ***** (** cloned ****** ***** ** *** **** ****) ** **** ******** clients **** ******* **.
  • *** ******** ** * ****** ****** * ***** ******* ******* large "****" ******* ** ***** ** **** ************** ** ** cameras.
  • ****** ** ******* ****** ***** ** ******** ***** * ****** machine **** ************** ******* ** ** ****** ******* ** ********** traffic.
  • ********* *** ********** ** ****** ********* **** *** ******* ** 8 ********** **** ***** *******, *******, *** *******.
  • ********* *** ********** ** ***** *** ********** *** *********** *** security ******** *** ********** ** *** ************** *******.
  • ****** *** *** ******** ** **** *** **** ***/** *****. Explained **** ******** **** *** **** ****** *** ** **** 480.  ** *********** ** ****** *** **** ** * ****** network ******.
  • *** *** ********* *** *** ** ********* ** ***** **** because ** *** ********* ** ********** ******** *** ** ** the ******* ** ****** ******* ***** *** *** ***** ****.

** ********, ******** ******** ********* **** ******* ** ** ***** attention ** *** **** ********** *** ******** ***********.  *** *******, the ******* ** "******** ******" **** ***** **** *** ***** "social ***********" ** ******* ** ** ******* **** ** ****** IT *********** **** *** ***** ** ** ******. ******** *** ********* mentioned *** ********, *** ********** ** ***** *********** *** ******** *** **** across ** ****** ******** *** *** ******** ** ************* ** a ******* **********.

** * ******* *****, ***** ** *** ********** ** *** ***** ** ** ****** *******.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Hacking

Dahua Manager: Lots of Backdoors Beyond Dahua or Hikvision on Mar 29, 2017
A Dahua technical manager has fired back at criticisms of Dahua's backdoor, posting publicly what many at Dahua have privately been saying for the...
Uniview Weak Local / Strong Remote Password Policy Tested on Mar 14, 2017
With the continuing onslaught of cyber-security breaches (see Dahua backdoor recently discovered, Hikvision defaulted devices getting hacked)...
Genetec Comments on Washington DC MPD Hack on Mar 13, 2017
This January, the Washington DC police video surveillance system was hacked with ransomware, impacting 123 of 187 cameras. Last month, IPVM...
Hikvision New Security Vulnerability on Mar 12, 2017
Hikvision has disclosed a new security vulnerability that affects 200+ of their IP cameras over the past few years. In this note, we examine the...
FLIR Responds to Dahua Backdoor on Mar 10, 2017
FLIR is the first Dahua OEM partner to issue a statement following Dahua's backdoor disclosure: Certain FLIR and Lorex branded products that...
Hikvision Firmware Decrypted on Mar 09, 2017
A developer has decrypted Hikvision's firmware, allowing examination of Hikvision's device source code and contents. In this report, we overview...
Dahua Backdoor Uncovered on Mar 06, 2017
A major cyber security vulnerability across many Dahua products has been discovered by an independent researcher, reported on IPVM, verified by...
Who Is Hacking Hikvision Devices? on Mar 06, 2017
Someone or organization is mass hacking Hikvision devices, actively and systematically running a script / program across the Internet that looks...
Hikvision Defaulted Devices Getting Hacked on Mar 02, 2017
Hikvision devices with default passwords and remote network access enabled (via DDNS, public IPs, etc.) have experienced wide spread hacking over...
Hikvision Barred From US City Housing Authority Bid on Feb 14, 2017
A US city's housing authority has barred Hikvision products from their bid, due to 'increasing security concerns.' In the past few...

Most Recent Industry Reports

Last Day Save $50 - IP Networking Course on Mar 30, 2017
Last Day to Save $50 on the May IP Networking Course. This is the only networking course designed specifically for video surveillance...
Dahua Manager: Lots of Backdoors Beyond Dahua or Hikvision on Mar 29, 2017
A Dahua technical manager has fired back at criticisms of Dahua's backdoor, posting publicly what many at Dahua have privately been saying for the...
$10,000 Free VMS Licenses For New Dealers IPConfigure on Mar 29, 2017
Another gimmick or a real deal? The company that brought 'Unlimited' Enterprise VMS License for Just $32,000 and a cannon to ISC West are back with...
Genetec and Axis Power Comcast's SmartOffice on Mar 29, 2017
Comcast has more than 20 million subscribers and $80 billion in revenue. Now Comcast is partnering with Genetec and Axis to deliver a...
IP Cameras Lose Buy America Protection on Mar 28, 2017
IP Cameras have lost the US government's 'Buy America' protection as the Security Industry Association (SIA) successfully lobbied the government to...
2Gig Intrusion Megatest (GC2 & GC3 Panels Tested) on Mar 28, 2017
2Gig is one of the most widely used intrusion systems, with two product lines that are the main offering of many alarm companies, huge national...
Anixter Favorability Results on Mar 28, 2017
Anixter's direct sales and integrator anger about it has been in the news recently: Anixter / Bosch Sells Direct to Amazon Anixter Touts...
Chinese Government Spies on Churches With Video Surveillance on Mar 27, 2017
The Chinese government is using video surveillance to spy on churches in China, reports UCANews, explaining: The [Chinese government]...
Hanwha Wisenet X Tested on Mar 27, 2017
Hanwha has released their latest generation, the Wisenet X series, powered by their new Wisenet 5 processor. This new series claims improvements...
Burglar Alarm Sirens Guide on Mar 27, 2017
Sirens are used to alert users to an alarm condition. In this note, we examine how to choose, locate, and install alarm sirens, including Siren...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact