{"id":133628,"date":"2021-12-16T14:17:34","date_gmt":"2021-12-16T19:17:34","guid":{"rendered":"https:\/\/www.een.com\/?p=133628"},"modified":"2022-03-26T01:08:41","modified_gmt":"2022-03-26T06:08:41","slug":"cybersecurity-criteria-in-digital-video-surveillance","status":"publish","type":"post","link":"https:\/\/www.een.com\/nb\/blog\/cybersecurity-criteria-in-digital-video-surveillance\/","title":{"rendered":"Cybersecurity criteria in digital video surveillance"},"content":{"rendered":"\n<p>Network cameras increase the security of the buildings being monitored.&nbsp;Thanks to intelligent analysis, they provide valuable information on business processes.&nbsp;At the same time, however, they may connect to the Internet and thereby create cybersecurity risks.&nbsp;A cloud-based video management platform helps to minimize the risks.<\/p>\n\n\n\n<p>Video cameras that are part of the corporate network can be dangerous. Like many other Internet of Things hardware, it is an attractive target for hackers who use a digital camera as part of their distributed denial of service (DDoS) attacks on companies. In prominent cases, around a million video cameras or digital video recorders connected to the mains were misused for DDoS attacks . Hackers integrated video cameras into botnets &#8211; for example into the self-spreading Mirai botnet. Cyber \u200b\u200battacks, however, threaten data protection if, for example, hackers hijack administration rights for cameras and can thus access the recorded video systems.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/www.security-insider.de\/kriterien-der-cybersicherheit-in-digitaler-videoueberwachung-a-1083492\/?cmp=beleg-mail\" target=\"_blank\" rel=\"noreferrer noopener\">Read the full article<\/a><\/div>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading\">In the News<\/h3>\n\n\n\n<p><em>Covered on these news sites. Click the image to read more.<\/em>&nbsp;  The English version is a translation of the original article that appeared in German. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.security-insider.de\/kriterien-der-cybersicherheit-in-digitaler-videoueberwachung-a-1083492\/?cmp=beleg-mail\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"285\" height=\"90\" src=\"https:\/\/www.een.com\/wp-content\/uploads\/2021\/12\/SecurityInsider-logo.png\" alt=\"SecurityInsider-logo\" class=\"wp-image-133617\"\/><\/a><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Network cameras increase the security of the buildings being monitored.&nbsp;Thanks to intelligent analysis, they provide valuable information on business processes.&nbsp;At the same time, however, they may connect to the Internet &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.een.com\/nb\/blog\/cybersecurity-criteria-in-digital-video-surveillance\/\"> <span class=\"screen-reader-text\">Cybersecurity criteria in digital video surveillance<\/span> Les mer &raquo;<\/a><\/p>\n","protected":false},"author":3169,"featured_media":133606,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"4139,4147,4823,4827,4829,4831","_relevanssi_noindex_reason":"","footnotes":""},"categories":[73],"tags":[],"class_list":["post-133628","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-company-news"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.een.com\/nb\/wp-json\/wp\/v2\/posts\/133628","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.een.com\/nb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.een.com\/nb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.een.com\/nb\/wp-json\/wp\/v2\/users\/3169"}],"replies":[{"embeddable":true,"href":"https:\/\/www.een.com\/nb\/wp-json\/wp\/v2\/comments?post=133628"}],"version-history":[{"count":0,"href":"https:\/\/www.een.com\/nb\/wp-json\/wp\/v2\/posts\/133628\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.een.com\/nb\/wp-json\/wp\/v2\/media\/133606"}],"wp:attachment":[{"href":"https:\/\/www.een.com\/nb\/wp-json\/wp\/v2\/media?parent=133628"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.een.com\/nb\/wp-json\/wp\/v2\/categories?post=133628"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.een.com\/nb\/wp-json\/wp\/v2\/tags?post=133628"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}