Research Paper | Information Technology | India | Volume 10 Issue 5, May 2021
CCTV Cameras Hacking and Prevention Techniques
The use of CCTV cameras is increasingly popular, especially for security reasons. However, such surveillance practices must be balanced against the privacy rights of those subject to the surveillance. Video surveillance, closed-circuit TV, and IP-camera systems became virtually omnipresent and indispensable for many organizations, businesses, and users. Their main purpose is to provide physical security, increase safety, and prevent crime. They also became increasingly complex, comprising many communication means, embedded hardware, and non-trivial firmware. In this paper, I conduct a systematic review of existing and novel threats in video surveillance, closed-circuit TV, and IP-camera systems based on publicly available data. The insights can then be used to better understand and identify the security and privacy risks associated with the development, deployment, and use of these systems. Includes existing and novel threats, along with their existing or possible countermeasures, and summarizes this knowledge that can be used in a practical way as a security checklist when assessing the cyber-security level of existing or new CCTV designs and deployments. I also provide a set of recommendations and mitigations that can help improve the security and privacy levels provided by the hardware, the firmware, the network communications, and the operation of video surveillance systems. I hope the findings in this paper will provide valuable knowledge of the threat landscape that such systems are exposed to, as well as promote further research and widen the scope of this field beyond its current boundaries.
Keywords: Cybersecurity, Google Dorking, Attacks, IP based cameras hacking
Edition: Volume 10 Issue 5, May 2021
Pages: 307 - 310
How to Cite this Article?
Preeti Rana, "CCTV Cameras Hacking and Prevention Techniques", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SR21507134453, Volume 10 Issue 5, May 2021, 307 - 310
Similar Articles with Keyword 'Cybersecurity'
Framework for Improving Critical Infrastructure Cyber Security
Naby Nouhou Nassou Conde, Jamaludin Bin Abrahim
Mamady Aissata Conde, Jamaludin Ibrahim
Similar Articles with Keyword 'Attacks'
Performing Attacks on Radio Frequency and Embedded based Systems
A Survey on Shoulder Surfing Resistant Text Based Graphical Password Schemes
Mokal P. H., Devikar R. N.