Cybersecurity - Axis P5676-LE User Manual

Hide thumbs Also See for P5676-LE:
Table of Contents

Advertisement

AXIS P5676-LE PTZ Camera
Learn more
In the application interface:
1. Go to Settings > Profiles.
2. Click
and select the preset position you created in the device's web interface.
3. Click Done.
4. Select a Trigger area.
5. Go to Settings > Filters:
-
To exclude small objects, set width and height.
-
To exclude short-lived objects, set a time between 1 and 5 seconds.
6. Click Autotracking to start tracking.
AXIS Object Analytics
AXIS Object Analytics is an analytic application that comes preinstalled on the camera. It detects objects that move in the scene and
classifies them as, for example, humans or vehicles. You can set up the application to send alarms for different types of objects. To
find out more about how the application works, see AXIS Object Analytics user manual.

Cybersecurity

Axis Edge Vault
Axis Edge Vault provides a hardware-based cybersecurity platform that safeguards the Axis device. It offers features to guarantee the
device's identity and integrity and to protect your sensitive information from unauthorized access. It builds on a strong foundation of
cryptographic computing modules (secure element and TPM) and SoC security (TEE and secure boot), combined with expertise in
edge device security.
Signed firmware
Signed firmware is implemented by the software vendor signing the firmware image with a private key. When a firmware has this
signature attached to it, a device will validate the firmware before accepting to install it. If the device detects that the firmware
integrity is compromised, the firmware upgrade will be rejected.
Secure boot
Secure boot is a boot process that consists of an unbroken chain of cryptographically validated software, starting in immutable
memory (boot ROM). Being based on the use of signed firmware, secure boot ensures that a device can boot only with authorized
firmware.
Signed video
Signed video ensures that video evidence can be verified as untampered without proving the chain of custody of the video file. Each
camera uses its unique video signing key, which is securely stored in the secure keystore, to add a signature into the video stream.
When the video is played, the file player shows whether the video is intact. Signed video makes it possible to trace the video back to
the camera origin and verifies that the video has not been tampered with after it left the camera.
Encrypted file system
The secure keystore prevents the malicious exfiltration of information and prevents configuration tampering by enforcing strong
encryption upon the file system. This ensures no data stored in the file system can be extracted or tampered with when the device is
not in use, unauthenticated access to the device is achieved and/or the Axis device is stolen. During the secure boot process, the
read-write filesystem is decrypted and can be mounted and used by the Axis device.
61

Advertisement

Table of Contents
loading

Table of Contents