Page 125 - Security Today, September 2018
P. 125

        end users video surveillance systems and their                                 
PASSWORDS
                             three categories of characters, depending on         not fall into the habit of using common personal information that can easily be found online. Avoid using birthdays, the name of your high school,  
  many users don’t). Many cameras and other         in user manuals online and therefore can be 
          This is a simple enough step that could create an extra level of security.
LEAST PRIVILEGE PRINCIPLE
        
user has access to such as audio, PTZ, alarm I/O. Use the principle of least privilege, providing         perform their necessary functions. If they need to access the setup menu once a year, provide  
or better yet, have a higher level user perform

DON’T FORGET PHYSICAL ACCESS TO DEVICES
         camera’s physical presence plays an important role. Cameras need to be placed in a hard                 systems that immediately generates an alert if  
MAINTENANCE
                 is saving security footage in a secure format that cannot be edited. It might be tempting to save  any basic media player, but you must resist the urge in the name of security. And of course,                                           
                           
ScanSource Networking and Security Focus SPRING 2018 | 12


































































































   123   124   125   126   127