Cybersecure surveillance partnership

CCTV Handbook 2019 Information Security, Surveillance

As the way we live and work becomes increasingly sophisticated, complex and connected, the benefits are clear to see as things get more streamlined and intuitive with every passing day. But whilst many enjoy the open connectivity that the Internet of Things (IoT) enables, they don’t realise they’re vulnerable to cybercrime.

In recent years, hackers have been responsible for security breaches on every major continent, across every business sector. In fact, according to The Official 2017 Annual Cybercrime Report, cybercrime damages will be costing the world a staggering $6 trillion by 2021. Not overall, but every year.

This trend clearly extended the discussion within video security from delivering the highest quality of relevant images and management of large data volumes, to how to keep video data secure in an increasingly connected world.

How do you safeguard against something that can’t be seen?

Video surveillance data is particularly susceptible to security breaches due to the method often used to connect across local and global networks. Typically, a number of edge components (cameras) send their data to core components (servers) via a network. Sounds simple. And that’s the problem, because to a digital intruder, this method of data transfer is easy pickings.

All it takes is a single weak link in a surveillance network for hackers to gain access to, and jeopardise, an entire data system. There is an obvious way to prevent this: don’t have any weak links. How? By employing a data security system that’s been configured by experts with vast cybersecurity knowledge to make it completely effective from end to end.

Partners in crime prevention

It’s impossible to put a figure on how many video management systems are in use around the world. However, Genetec is a major player in this arena. And when it comes to leading the way in mission-critical video security projects, nobody comes close.

Having access to the VMS expertise of Genetec, combined with the years of constant innovation behind Bosch surveillance cameras, is certainly good news for you, and bad news for cyber criminals. And, because Bosch cameras are fully integrated with Genetec systems, the result is an end-to-end data security solution incorporating all Bosch network video surveillance cameras, plus Genetec Archiver and Security Center.

The key to total security is total trust

There’s little point focusing on the security of a single component when there’s an entire infrastructure to consider; one that could carry a weak link where hackers could gain access. That’s why all network-wide communications between Bosch cameras and Genetec Archiver and Security Center are assigned an authentication key (a Bosch factory default or customer-specific certificate). This electronic signature enables the solution to verify the legitimacy of network components like cameras or storage units, and viewing clients, ensuring you can build an infrastructure of trust before network-wide communications start.

The best form of protection is encryption

A high percentage of online crimes involve the illegal capture of video data, so your chosen method of safeguarding your system needs to be consistently effective and completely reliable, and this is precisely why encryption of data streams and stored data is not just paramount, but non-negotiable.

As you’d expect from a brand like Bosch, it has been implementing encryption at the hardware level for some time. Specifically, all Bosch IP cameras have a Trusted Platform Module (TPM) installed at factory stage. The TPM safely stores cryptographic keys to enable encryption of all live video data, which is then sent from the camera to the Genetec archiver using SRTP (Secure Real-Time Transport Protocol), which further protects the integrity of the data. And for additional reassurance, all encrypted communication between Genetec Archiver and Genetec clients is managed via SRTP or HTTPS.

Another advantage of using SRTP throughout the whole infrastructure is that customers are enabled to setup a secured multicast network, so you get security and good network scalability at the same time.

With all security measures at hardware level combined with SRTP, Bosch and Genetec offer an end-to-end encryption solution. All video data is encrypted at the moment it is captured and remains encrypted throughout the whole video security infrastructure. Compared to transmitting RTSP via an HTTPS tunnel, this can create a saving on computing power of 50%, because additional encryption is not needed.

If the system doesn’t know you, you don’t get into the system

Genetec is the expert in secure video management systems, so it knows that the only way to outsmart a hacker is to think like a hacker. By doing so, it’s developed a software system that offers multiple ways to manage user access rights, ensuring that only authenticated and authorised parties can access data.

Security is established via a ‘permissioning’ scheme based on privileges accumulated by specific users and groups. It’s like an updated version of the familiar ‘user profile’, and is being received positively by clients, if not the digital intruders.

Easy management of user access rights

The Genetec Security Center has a comprehensive set of privileges at its disposal, which gives administrators complete control, at a granular level, over the permissions each user or user group can select in order to gain access to the system. The options include over 300 privileges that can be denied or granted to any user, or to an entire user group.

Any users added to a certain group will automatically inherit all existing privileges assigned to that group. Several examples of how sophisticated these privileges can be include the ability for a user to view live video, view playback, add a bookmark to a video timeline, and even move a PTZ (pan, tilt and zoom) camera.

Synchronised, centralised, better protected

For an extra level of security and support, Security Center also integrates with Active Directory, allowing user management to be monitored and centralised at Windows level. In addition to individual users, user groups from Active Directory can also be synchronised with Security Center, so that when new users are added or removed from an Active Directory User Group, the action will be replicated in Security Center. As mentioned previously, new users will automatically inherit existing Security Center privileges defined for that group.

How Bosch secures its cameras

Passwords as we know them today are still an essential layer of security enforcement at the initial setup stage. Thereafter, the Genetec archiver uses a client certificate to authenticate itself to the Bosch camera. As an extra measure, the client certificate must be signed by a trusted third party whose identity has been previously installed on the root of the camera.

In addition, the cameras can disable any attempt to execute third-party software; only Bosch-approved firmware updates will be accepted. Unique Bosch-authenticated certificates are factory-installed on all cameras and any cryptographic operations for authentication and encryption are only executed inside the built-in TPM.

How Genetec secures its management software and clients

As long as passwords remain in use, the issue of poor entropy will persist; this is when passwords are badly chosen, and therefore at greater risk of being guessed as the majority of words used have a maximum character count and are memorable to avoid being forgotten. If the password can’t be guessed, then a more heavy-handed approach must be taken, such as hacking.

Certificates aren’t affected in the same way, which is why Genetec uses certificate authentication for its Security Center management software and clients. The video management system interacts directly with the Bosch cameras using certificates for authentication. Cryptographic keys used for authentication as well as encryption are safely stored inside the Bosch camera’s TPM.

Genetec Security Center offers, depending on specific requirements, either customer-signed certificates, certificates of the Windows certificate’s store or certificates issued by a trusted authority; an example of a certificate authority (CA) is the Bosch in-house authority, Escrypt.

With Bosch and Genetec, you can feel confident that your data is protected by one of the world’s best security solutions, end to end, day after day.For more information contact:

• Bosch Building Technologies, +27 11 651 9600, [email protected], africa.boschsecurity.com

• Genetec, Brent Cary, [email protected], www.genetec.com


Credit(s)





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
What are MFA fatigue attacks, and how can they be prevented?
Information Security
Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it.

Read more...
SA's cybersecurity risks to watch
Information Security
The persistent myth is that cybercrime only targets the biggest companies and economies, but cybercriminals are not bound by geography, and rapidly digitising economies lure them in large numbers.

Read more...
Cyber insurance a key component in cyber defence strategies
Information Security
[Sponsored] Cyber insurance has become a key part of South African organisations’ risk reduction strategies, driven by the need for additional financial protection and contingency plans in the event of a cyber incident.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
Re-imagining business operations with the power of AI
AI & Data Analytics Surveillance
inq., a Convergence Partners company, has introduced a range of artificial intelligence (AI) solutions to assist organisations across industry verticals in optimising business operations and improving internal efficiencies.

Read more...
Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...