Studies have shown that hackers can exchange real video feeds from cameras for fake ones
Any wireless device can be a soft target
for hackers
Security network hacking is one of the hottest topics today. The ability to access security systems or devices anywhere, leaves them vulnerable and prone to hacking. Any wireless device can be a soft target for hackers. Let’s start with the concept that nothing on a network is really secure. Let’s admit this to ourselves and take the next steps to make our security networks more secure.

Internet of Things security

We all want our networks to be the network of everything. We want to be able to access our security systems everywhere. We want to view cameras, receive alarms, get notifications on our cell phones or from access points that are not our own. We want to cut the cable with wireless transmission. All of these are just an invitation to make our systems less secure.

We demand more security and blame camera manufacturers, video management systems (VMS) or network video recorders (NVR); at the same time, we want to pay less. We want the convenience of accessing everything over the Web and mostly using the Internet.

Closed network security systems

No one is safe. In June, antivirus software provider Kaspersky Lab was hacked. Most of our security devices protect themselves with user names and passwords, and in most cases these are ineffective. The real protection is to limit access to a system as much as possible.

In a typical network system, we have cameras connected to a network switch fed to a recording device usually in the form of a video server or NVR. The first question is: How much exposure do I really need? Video security used to be referred to as CCTV – closed circuit television. Sometimes, it still is. The key word is “closed.” Why not think about network video security systems as CNSS or “closed network security systems?”

Every access point on a network has a potential for hacking. Once a security system is hacked, anything is possible. Studies have shown that hackers can exchange real video feeds from cameras for fake ones. It’s a variation on what used to be cutting the video cord or masking the lens in the analogue days. So what can you do to prevent your system from being hacked?

Every access point on a network
has a potential for hacking.
Once a security system is hacked,
anything is possibl
e

Create a separate network

Let’s start with the obvious, make it a CNSS. This can be as political as it is technical, given that governance of security systems is shifting from the security department to IP directors who want to centralise their control. Next are the common sense approaches. If you can access IP devices by pinging them from any point outside your system, it is an open door for hackers.

Disable common access

Port 80 which is most commonly used for Internet traffic should especially be disabled. Most network switches have the ability to be accessed with the help of a function called Telenet using ports 21 and 23 – disable these as well.

Create your own unique subnet and IP address

An IP address is basically a 32-bit number that can range from 0 to 429496794, and has the potential to create about 4.3 billion unique addresses. Keep in mind, we are dealing with our own CNSS, so concerns about conflicts outside the network don’t exist. For example, if you are using an address of 192.168.1.xxx, with a subnet of 255.255.255.0, any IP address starting with 192.168.1 will be able to access devices on your network.

Do you really need a Layer 3 switch?

Keep in mind that “layering” as it pertains to network switches is primarily a marketing term and not a standard. The major difference in what we can consider a Layer 2-plus and Layer 3 is routing. A router routes IP packets among IP networks, which in our case makes it a major point of exposure. Think about routing in terms of Google. You ask a question, send it out and it crosses hundreds, perhaps thousands of access points on different networks until it is finally received at its destination, is responded to and is transmitted back to your computer over hundreds or thousands of additional access points. All of these cross different subnets over Wide Area Networks. Do you really need to have your system exposed to this for the privilege of paying more for Layer 3 capability as opposed to Layer 2?

Most network switches have the ability to be accessed with the help of a function called Telenet using ports 21 and 23 – disable these as well

User names and passwords

They give us a sense of security, but in reality names and passwords are probably the least secure method.

We now know that Android phones can be easily hacked without requiring the user to view a message or open an attachment. In doing so, all your information is exposed, including the phone application that allows you to view your security system. While a fix exists, due to the open source nature of Android it will be significantly more difficult to secure in comparison to single sources such as iOS.

Network switching - most critical point

The network switch is a gathering point for your security system. Once you have created your own network, removed access from outside networks by disabling common port access and avoided the use of routers or Layer 3 switches, you can take additional steps to internally secure your system. One of the most common and effective methods is the use of internal system MAC (Media Access Control) addressing. It is unique to each product that is IP-enabled. Your computer, cell phone and every component of your IP-based security system has a unique MAC address. Select a managed switch whose programming allows you to secure your system using MAC addressing. Your cameras can be connected to specific switch ports using MAC addressing, thus preventing them from unauthorised changes. Most importantly, the MAC address of the client computer can be tied to the switch to prevent outside or even internal access. This feature is known as MAC locking and is directly related to MAC lockouts, which disables unauthorised MAC addresses from gaining access.

In the end, the decision as to how you construct your system network is up to you. Regardless of how attractive, the use of cell phones or the thought that Layer 3 must be better than Layer 2 switching are just invitations to hack your system. Every access point is another open door. Maybe it’s time to reconsider the meaning of “Closed Circuit.”

Download PDF version Download PDF version

Author profile

In case you missed it

Anviz Global expands palm vein tech for security
Anviz Global expands palm vein tech for security

The pattern of veins in the hand contains unique information that can be used for identity. Blood flowing through veins in the human body can absorb light waves of specific wavelen...

Bosch sells security unit to Triton for growth
Bosch sells security unit to Triton for growth

Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The transaction enc...

In age of misinformation, SWEAR embeds proof of authenticity into video data
In age of misinformation, SWEAR embeds proof of authenticity into video data

The information age is changing. Today, we are at the center of addressing one of the most critical issues in the digital age: the misinformation age. While most awareness of thi...

Quick poll
What is the most significant challenge facing smart building security today?