Page 58 - Security Today, September 2018
P. 58

SYSTEM DESIGN
Titima Ongkantong/Shutterstock.com
CONSIDER DATA SECURITY Every project must ensure best practices
By Paul Garms and Sean Murphy
Data security is just as im- portant as the premises we safeguard, making it im- perative to consider both physical and cybersecurity simultaneously. As security
technology becomes increasingly connected—allowing it to take advantage of the Internet of Things and offer enhanced integration capabilities—we must ensure data security best practices in every project.
As with any connected device, there are risks to security tech- nology that must be addressed. Similar to other devices attached
to a network, these can include unauthorized access, denial of service attacks, and repurposing a device by downloading mal- ware. We have seen increasing use of data security best practices in our industry, but there is still room for improvement. Do you know what to look for when considering data security? Let’s break down some of the key points for minimizing risk.
Operating Systems
Full featured operating systems, such as Linux or Windows, provide services to install and run applications and support file systems and general purpose remote sessions, and these ser- vices can be used to attack the system. Most VMS servers and NVRs reside on either a Windows or Linux operating system, making it imperative that the most current updates and patches are applied. Also, ensure the VMS can work with a firewall up,
NS10
0918 | NETWORKING SECURITY


































































































   56   57   58   59   60