November 2022, Newsletter
While we embark on a journey of sharing knowledge and building a learning ecosystem, we wish to introduce the e-Lumination newsletter series , an attempt to illuminate the knowledge store and develop the efficiencies of existing videos surveillance systems.
– From The Director’s Desk
“In 2020, the average cost of a data breach was USD 3.86 million globally, and USD 8.64 million in the United States “
Cyber Security for Video Surveillance
While effective Cyber security for video surveillance systems remains the talk of the town in numerous events and symposiums, the thrilling underlying fact that majority of the users across industries are still unaware of the perils of the monster. As per a survey conducted by Axis and Genetec, only a handlful (15% ) of organizations feel adequately prepared to mitigate a cyber threat. Many (59% of end customers) blame their vulnerabilities on legacy systems as they see them as a hurdle to address IoT threats, but the reality is that no device – old or new – is 100% immune to hacks; at some point, you must open a door to let someone in or out of your system, it’s inevitable
Definition: As per IBM, “Cybersecurity is the practice of protecting critical systems and sensitive information from digital attacks”
Key cybersecurity technologies and best practices:
Identity and access management (IAM): It defines the roles and access privileges for each user, as well as the conditions under which they are granted or denied their privileges
A comprehensive data security platform: It protects sensitive information across multiple environments, including hybrid multicloud environments
Security information and event management (SIEM): Aggregates and analyzes data from security events to automatically detect suspicious user activities and trigger a preventative or remedial response
Common Cyber Threats
Malware: Malicious software variants—such as worms, viruses, Trojans, and spyware
Ransomware: A type of malware that locks down files, data or systems, and threatens to erase or destroy the data.
Phishing: A form of social engineering that tricks users into providing their own PII or sensitive information.
Insider Threat: A current or former employees, business partners, contractors, or anyone who has had access to systems or networks
Distributed denial-of-service (DDoS) attacks: A DDoS attack attempts to crash a server, website or network by overloading it with traffic
Advanced persistent threats (APTs): An intruder or group of intruders infiltrate a system and remain undetected for an extended period.
Man-in-the-middle attacks: An eavesdropping attack, where a cybercriminal intercepts and relays messages between two parties in order to steal data.