Downloads: 11 | Views: 413 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper | Information Technology | India | Volume 10 Issue 5, May 2021 | Popularity: 5.6 / 10
CCTV Cameras Hacking and Prevention Techniques
Preeti Rana
Abstract: The use of CCTV cameras is increasingly popular, especially for security reasons. However, such surveillance practices must be balanced against the privacy rights of those subject to the surveillance. Video surveillance, closed-circuit TV, and IP-camera systems became virtually omnipresent and indispensable for many organizations, businesses, and users. Their main purpose is to provide physical security, increase safety, and prevent crime. They also became increasingly complex, comprising many communication means, embedded hardware, and non-trivial firmware. In this paper, I conduct a systematic review of existing and novel threats in video surveillance, closed-circuit TV, and IP-camera systems based on publicly available data. The insights can then be used to better understand and identify the security and privacy risks associated with the development, deployment, and use of these systems. Includes existing and novel threats, along with their existing or possible countermeasures, and summarizes this knowledge that can be used in a practical way as a security checklist when assessing the cyber-security level of existing or new CCTV designs and deployments. I also provide a set of recommendations and mitigations that can help improve the security and privacy levels provided by the hardware, the firmware, the network communications, and the operation of video surveillance systems. I hope the findings in this paper will provide valuable knowledge of the threat landscape that such systems are exposed to, as well as promote further research and widen the scope of this field beyond its current boundaries.
Keywords: Cybersecurity, Google Dorking, Attacks, IP based cameras hacking
Edition: Volume 10 Issue 5, May 2021
Pages: 307 - 310
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Research Paper, Information Technology, India, Volume 8 Issue 11, November 2019
Pages: 2068 - 2077Role of IoT in Remote Patient Monitoring Systems
Venkat Raviteja Boppana
Downloads: 0
Research Paper, Information Technology, India, Volume 9 Issue 6, June 2020
Pages: 1964 - 1973From FinTech to Healthcare: A DevOps Journey Across Industries
Vishnu Vardhan Reddy Boda
Downloads: 0
Research Paper, Information Technology, India, Volume 11 Issue 3, March 2022
Pages: 1650 - 1657Zero Trust in Healthcare: Building a Secure Future with DevOps
Vishnu Vardhan Reddy Boda
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Student Project, Information Technology, India, Volume 11 Issue 10, October 2022
Pages: 959 - 963Medical Data Security using RSA and Visual Cryptography
Bency Wilson, Jesline Abraham
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, India, Volume 9 Issue 4, April 2020
Pages: 1850 - 1857Securing Remote Work Environments in Telecom: Implementing Robust Cybersecurity Strategies to Secure Remote Workforce Environments in Telecom, Focusing on Data Protection and Secure Access Mechanisms
Jeevan Manda