12px13px15px17px
Date:22/07/20

How to protect our IP cameras from cyber attacks?

In order to inform the public, the Electronic Security Service under the Ministry of Transport, Communications and High Technologies has made public the ways to determine if security cameras are in danger and the rules for protecting them from cyber attacks.
 
The following situations indicate that the security camera is in danger:
 
1. Strange sounds come from the security camera – it is one of the main signs that the camera has been attacked. This indicates that the camera has been activated or is being controlled by a hacker.
 
2. Security settings of the camera have been changed or the cipher is set as the default password – another noticeable sign that the camera has been hacked.
 
3. The camera rotates abnormally. If the camera is tracking your movements or is moving in a direction other than normal, then there is a high probability that the camera is being controlled by hackers.
 
4. If the LED is on even though you have not turned on the camera, it means that someone else is controlling it.
 
The Electronic Security Service under the Ministry of Transport, Communications and High Technologies recommends that the following rules should be followed to protect security cameras from cyber attacks:
– Buy security cameras only from a reputable and reliable supplier. Before purchasing a camera the most important step is to obtain information about the security level of the product (whether transmitted data is encrypted, the strength of encryption, whether the software update is possible, technical support, etc.).
 
– Make sure the IP camera has basic security features like SSL / TLS and WPA2-AES encryption. Please note that devices not supporting SSL / TLS encryption transmit data in clear text. It also puts IP cameras at risk of cyberattacks.
 
– Configure your WiFi network and router correctly. To secure your Wi-Fi network is the first and easiest step to secure your IP cameras. This can include using WPA2-AES encryption, changing the default network name (SSID), changing the default username and passwords for the router, using strong passwords, disabling UpnP, and more.
 
– Change default passwords and use strong passwords. Experience has shown that the main reason for hacking IP cameras externally is that standard passwords are not changed or encrypted when in use. It is very dangerous. Use a combination of uppercase and lowercase letters, numbers, and symbols when creating your password. Remember to update your passwords regularly.
 
– Change the default HTTP and TCP port numbers. Replacing the standard HTTP and TCP ports can significantly improve the security of your camera. HTTP and TCP ports are used for remote network access. You can assign these two ports to any port number between 1025 and 65535.
 
– Activate HTTPS / SSL encryption. If your camera supports access through web browser, you must create an SSL certificate to enable HTTPS. Once HTTPS is started, data between the camera and the client is encrypted.
 
– Regularly update the camera firmware from official sources. Manufacturers usually update software versions to address vulnerabilities. Stay up to date with the latest updates by visiting the manufacturer’s website.
 
– Disable the “Remote Online Tracking” function. Many security cameras allow you to monitor your home remotely. It also allows hackers to get remote access to your camera. Disable this feature when you are not using it.
 
– Limit the number of devices you use when accessing security systems. Use personal mobile phones and computers to access the system. To avoid compromising system security, avoid accessing the system from shared computers.
 
– Install a firewall and antivirus to protect your system from external threats.
 
– Turn off webcams when you are not using them. Laptops or computers have a webcam on / off function. Disable this feature if you are not using it to protect yourself from potential hacks. You can apply the same procedure to a microphone.
 
– Cover your webcam. While this may sound absurd, we must be careful because malware is designed to see and hear us through webcams. Cover the camera with tape or an appropriate product when it is not in use.
 
– Protect email used for password recovery. Imagine what could happen if an attacker gains access to the email that you used to recover all of your passwords? The best alternative is to use a separate email address for each purpose.
 
– Install your cameras in a safe place out of the reach of everyone.
 
– Do not use public Wi-Fi networks for online surveillance. A cybercriminal can trick you into creating such a network, or your data can be intercepted, since such networks are accessible and unprotected to everyone.
 
The above recommendations should apply not only to IP cameras, but also to all devices connected to the internet. Before purchasing any device that uses an internet connection, it is recommended that you check how secure the product is against cyber attacks. The above precautions must be observed when setting up the device.
 
It is to be recalled that when faced with cyber incidents, you can contact the Electronic Security Service under the Ministry of Transport, Communications and High Technologies via the official website www.cert.az or e-mail reports@cert.az.
 





Views: 337

©ictnews.az. All rights reserved.

Facebook Google Favorites.Live BobrDobr Delicious Twitter Propeller Diigo Yahoo Memori MoeMesto






20 April 2024

19 04 2024