Security; Ip Filtering; Username And Password; Security Protocols - Vivotek IP Surveillance Overview

Table of Contents

Advertisement

4.6 Security

Since data is likely to be intercepted during transmission, appropriate protection schemes are needed. The
following methods can protect data from security risks.

4.6.1 IP Filtering

You can confine a client's IP address within a specific range to authorize or deny user access. A client's IP address
in an authorized list will be able to access data while that in a denied list will be refused to access.

4.6.2 Username and Password

You can assign accounts and passwords to users so as to achieve simplified and efficient management.
VIVOTEK offers the three user privilege levels of administrator, operator and viewer; only administrators can make
configurations.

4.6.3 Security Protocols

Security protocols protect data from unauthorized access. SSL/TLS and IPSec are three basic network security
protocols. The major difference is that SSL/TLS encrypts the data and IPSec encrypts the transmission channel.
SSL/TLS
SSL (Secure Sockets Layer) encrypts data transmitting between the server and the client to ensure the
confidentiality and integrity of the data. When a client submits a request for accessing web pages, a public key is
sent to the client for data encryption. Data encrypted by the client using the pubic key can be decrypted only by the
server's private key. Due to this property of the keys, the client is able to send secure data that can be understood
only by the server. SSL can protect data from being counterfeited, intercepted or tampered and is the most
common security standard for e-commerce.
TLS (Transport Layer Security) is a standard developed on the basis of SSL for higher security, confidentiality, data
integrity and authentication.
Network Camera
Network Camera
Figure 4.8 Data transmission (a) without SSL/TLS encryption and (b) with SSL/TLS encryption
HTTPS
HTTPS is a combination of HTTP and SSL/TLS. It encrypts data at the source port and decrypts it at the
destination port. HTTPS is mainly used to protect e-commerce, asset management, e-mails or IP surveillance
systems.
(a)
(b)
Chap.4 IP Network
33

Advertisement

Table of Contents
loading

Table of Contents