securitylinkindia

Addictive Technology Solutions Enhances the Drive-through Experience with Milestone Systems

Robert Marsden, Managing Director of Addictive Technology said, “While we have a lot of experience in making and providing for better drive through experiences, there is always room to innovate and grow. We looked at the technologies now available and came up with a system that provides a faster, more frictionless ordering system, based on the latest licence plate recognition (LPR) technology.” Customers expect a fast, seamless drive-through experience, and are often under time pressure, especially if they are ordering food and coffee on their morning commute. Long queues and wait time can detract from the drive-through experience, and have a significant effect on customer satisfaction and loyalty. The success of the drive-through café or restaurant itself depends on getting as many customers serviced as possible in any given hour, especially at peak times. The fast food and beverage market is very competitive during commute times, and an efficient drive through service can be the difference between success or failure. Solution White Label Software built an in-house software solution that sits between a restaurant or cafe’s PoS system and networked video cameras, based on Milestone Systems’ open XProtect video management software (VMS) platform. The software uses LPR technology to identify regular customers as they drive up to place their order, accesses the restaurant’s database of VIP customers in real time to see if they have a favourite coffee or snack, and sends a message to the kitchen to start preparing those items before the customer has arrived at the sales window. The customer’s coffee will be ready before they arrive at the order point, and the system will also allow cross-checking to ensure that the predicted order matches the customer’s actual order. “Our PoS system has an API, and that application sits in the middle of Milestone and our PoS system. A Windows application reads the licence plates then talks to the PoS system. It is an SQL based system with a database stored in the cloud on Amazon Web servers, so it does all this in a few seconds,” said Marsden. The solution is also flexible. Outlets can decide whether they want customers to register in advance and confirm what they want ahead of time, so that the same order is placed every time or they have the option of using the predictive analysis built into White Label’s proprietary PoS software. This analysis proves accurate for 90 percent of orders,with just 10 percent of customers deciding they want something different on a specific day. The PoS software will analyse the customer’s last ten or more orders and pick the one that comes up the most. The cost of any wastage using this system is considerably less than the cost of a slower drive-through experience. The innovation stems from Addictive Technology’s extensive experience working with Drive Thru food outlets. When provisioning a drive-through space, the SI deploys all technologies themselves from PoS through to networking and wireless, LPR software and all associated integrations. Addictive’s Milestone Systems LPR solution provides a minimum of four or five seconds head-start for each predicted order, and as much as two minutes head-start for high volume outlets during busy times. This head-start can be critical to avoiding congestion at busy times, and make the difference between an efficient and streamlined ordering process, and one which backs up and causes customers to be delayed. The solution means that when cars are queued at the order point, the outlet can already be making coffee for the car behind it. In the quick service restaurant industry, outlets survive or perish based on their customer satisfaction, and the number of cars that are able to physically pass through their drive-through on an hourly basis. The Milestone solution Milestone Systems is an open platform, meaning that developers are able – and openly encouraged – to build upon the code. This has enabled Addictive Technology to adapt the existing LPR software to their own needs, and integrate it with their proprietary PoS software solution. Software is seldom used in a stand-alone capacity these days, so the power of an open platform means that integrators such as Addictive Technology are able to harness the power of a major platform, and combine with several other solutions to provide customers with a fully integrated system that fits their specific needs.   “The power of an open platform such as Milestone allows us to tailor solutions directly to our customers’ requirements, and then extend our ongoing services to those customers after the build. Everybody wins – customers get the system that works best for their financial outlay; as a systems integrator we get to provide the sort of solutions and services that we want, rather than being forced to follow someone else’s guidelines, and we get to administer that solution after it is deployed in order to maintain satisfied customers,” explained Marsden. Due to the flexibility of Milestone Systems’ platform, Addictive Technology is also able to keep customer costs down. Rather than rely on specific cameras with extended functionality for LPR use, the solution is able to use relatively cost-effective cameras, so long as the resolution is of high enough quality. Further to this, Addictive Technology is able to deploy the Milestone LPR software on a physical CCTV server along with cameras and storage, rather than provision a dedicated server, which further reduces costs or run it on dedicated Milestone hardware. In other instances the SI has built a virtualised LPR server based on a VMware running Windows 10, in order to re-use existing hardware. “This again demonstrates the flexibility and power of the software-driven solution,” explained Marsden. The bespoke PoS and LPR solutions designed and implemented by Addictive Technology are also made available to other companies wishing to licence them, which opens up another window of opportunity for Addictive Technology. Marsden explained that on the next version of the software, currently being built by White Label, orders will be sent straight to the kitchen video system as well as different locations throughout the…

Read More

Security in the Cloud: How Stratocast Keeps Your Video Safe

Genetec Stratocast™ is a cloud-based video monitoring system that makes the adoption of network video security solutions easy and allows you to connect to your business wherever you go. Using the Microsoft Windows Azure cloud-computing platform, Stratocast eliminates the need for on-site servers. As a result, installation time is reduced and you can begin monitoring your premises quickly. Using video surveillance equipment such as IP (Internet Protocol) cameras or analog cameras, you can record video on your edge recording video unit or in the Stratocast cloud. If recording on your video unit, the video is recorded continuously, whereas if recording in the Stratocast cloud, you can choose to record either continuously or only when motion is detected. From your laptop, tablet, or smartphone, you can then watch live and recorded video that is safely stored in the cloud. In addition, through Genetec Federation™, Security Center users can view and control all Stratocast cameras from their local installation of security desk. The starting diagram illustrates how Stratocast works to keep you connected to your business, wherever you go. Security is crucial for us at every level of development and operations. Based on industry best practices, our engineers embed security standards into the development lifecycle and operations. This white paper focuses on the cloud architecture and the operational security of the platform as well as the security capabilities of the customer portal. The video and camera security of Stratocast are also discussed. Cloud architecture Stratocast is deployed on the Microsoft Azure cloud platform. This platform, with its industry-recognized security, securely stores data that our customers entrust us with. Microsoft Azure has been audited against SOC 1, SOC 2, and SOC 3 standards. Audits are conducted in accordance with SSAE 16 and ISAE 3402 standards. Certifications are regularly updated and can be provided. Stratocast and Azure are also compliant with ISO 27001:2013. The service architecture is built for high availability and scalability, allowing customers to enroll and record as many cameras as needed without impacting the service. There are no constraints limiting the maximum amount of data that can be stored in Azure, as data centers are provisioned with enough capacity to ensure that they meet growing demand. This architecture, coupled with the robustness of the underlying Microsoft Azure Cloud, allows Genetec to provide a 99.5% SLA. Security controls Stratocast and Azure adhere to a rigorous set of security controls that govern operations and support. Genetec and Microsoft deploy a combination of preventive, defensive, and reactive controls including the following mechanisms to help protect against an unauthorized developer and/or administrative activity: Tight access controls, including a mandatory two-factor authentication. Combinations of controls that enhance independent detection of malicious activity. Multiple levels of monitoring, logging, and reporting. Security reports are used to monitor access patterns and to proactively identify and mitigate potential threats. Microsoft administrative operations, including system access, are logged to provide an audit trail if unauthorized or accidental changes are made. Automatic patching of the operating systems and applications running in the cloud. Additionally, the Genetec and Microsoft teams conduct background verification checks of certain operations personnel and limit access to applications, systems, and network infrastructure based on the level of background verification. High availability Azure facilities are designed to run 24x7x365 and employ various measures to help protect operations from power failure, physical intrusion, and network outages. These datacenters comply with industry standards for physical security and availability. They are managed, monitored, and administered by Microsoft operations personnel. Redundancy Stratocast video is stored in triplicate, within the same datacenter, ensuring the redundancy of critical data and mitigating the impact of hardware failure. Control of data location Knowing and controlling the location of an organization’s data can be an important element of data privacy, compliance and governance. Customers can specify the geographic area where their recordings are stored. Through this approach, recordings are replicated within a defined region for redundancy but are not transmitted outside the customer’s desired geographic boundaries. Operational security As a trusted provider of security solutions for a considerable number of government agencies and high-profile public and private organizations worldwide, we take compliance with local regulations very seriously. This, of course, includes the laws pertaining to data security and protection of privacy in the regions where we sell our products and services. Additionally, to ensure that all customer data is stored and used in an appropriate and secure manner, Stratocast is certified with the ISO 27001:2013 information security standard. The ISO 27001 standard is a framework of policies and procedures including legal, physical, and technical controls that address cyber security risks. These policies and procedures are part of the Information Security Management System (ISMS) at Genetec, that has been audited and certified by the ISO organization. Below is an excerpt of some of the relevant portions of it. Secure development policy Genetec is conscious that security is something that has to be embedded in the development practices and not something that can be added after the fact. Consequently, the Stratocast software development lifecycle (SDL) includes specific activities, pertaining to cyber security, that have to be completed in order to release each new version of Stratocast. These activities are defined in the secure development policy and include – secure design review performed on a periodic basis, manual or automated security testing, and penetration testing performed by a 3rd party auditor. Incident management & disaster recovery I t can be challenging to react appropriately to a cyber security incident when it happens, if nothing has been prepared for it beforehand. To avoid this, we have instilled a well-established incident management plan describing appropriate responses. This includes among others – the criteria defining the severity of an incident, the roles and responsibilities of each stakeholder involved in the management of that incident, the incident lifecycle, and the service level objectives. In a similar fashion, it’s best practice to establish a disaster recovery plan in the event of external service outages. Stratocast has a well thought out plan that reduces any negative…

Read More

Fortinet Advises Cyber Distancing and Network Isolation to Protect Organizations from Cyberattacks

Over the past several weeks, FortiGuard Labs has been monitoring a significant spike in COVID-19 related threats. Cybercriminals are unleashing a surprisingly high volume of new threats in this short period of time to take advantage of inadvertent security gaps as organizations are in a rush to ensure business continuity. Cybercriminals are exploiting the rapid change to our digital world An unprecedented number of unprotected users and devices are now online with one or two people in every home connecting remotely to work through the internet. Simultaneously there are children at home engaged in remote learning and the entire family is engaged in multi-player games, chatting with friends as well as streaming music and video. FortiGuard Labs is observing this perfect storm of opportunity being exploited by cybercriminals as the Threat Report on the Pandemic highlights:  A surge in phishing attacks: FortiGuard Labs research shows an average of about 600 new phishing campaigns every day. The content is designed to either prey on the fears and concerns of individuals or pretend to provide essential information on the current pandemic. The phishing attacks range from scams related to helping individuals deposit their stimulus for Covid-19 tests, to providing access to Chloroquine and other medicines or medical device, to providing helpdesk support for new teleworkers. In addition to scams targeting adults, some phishing attacks target children with offers of online games and free movies, or even access to credit cards to buy online games or shop online. Phishing scams are just the start: While the attacks start with a phishing attack, their end goal is to steal personal information or even target businesses through teleworkers. Majority of the phishing attacks contain malicious payloads – including ransomware, viruses, remote access trojans (RATs) designed to provide criminals with remote access to endpoint systems, and even RDP (remote desktop protocol) exploits. A Sudden spike in viruses: The first quarter of 2020 has documented a 17% increase in viruses for January, a 52% increase for February, and an alarming 131% increase for March compared to the same period in 2019. The significant rise in viruses is mainly attributed to malicious phishing attachments. Multiple sites that are illegally streaming movies that were still in theatres secretly infect malware to anyone who logs on. Free game, free movie, and the attacker is on your network. Risks for IoT devices magnify: As users are all connected to the home network, attackers have multiple avenues of attack that can be exploited targeting devices including computers, tablets, gaming and entertainment systems, and even online IoT devices such as digital cameras, smart appliances – with the ultimate goal of finding a way back into a corporate network and its valuable digital resources. Ransomware like attack to disrupt business: If the device of a remote worker can be compromised, it can become a conduit back into the organization’s core network, enabling the spread of malware to other remote workers. The resulting business disruption can be just as effective as ransomware targeting internal network systems for taking a business offline. Since helpdesks are now remote, devices infected with ransomware or a virus can incapacitate workers for days while devices are mailed in for reimaging. Solutions and countermeasures Organizations should take measures to protect their remote workers and help them secure their devices and home networks. Cyber social distancing is all about recognizing risks and keeping distance. Isolation is all about segmenting networks and quarantining the malware from spreading across the network. Here are a few critical steps to consider: Endpoint security: Endpoint security provides a VPN client to ensure that remote traffic remains secure. For organizations looking for an even more robust endpoint security solution a EDR solution provides advanced, real-time threat protection for endpoints both pre and post-infection, in addition to robust antivirus technologies installed at the kernel to detect and prevent malware infection, it can also respond to device breaches in real-time by detecting and defusing potential threats before they have the chance to compromise the system. Connectivity: VPN connections can be run and managed independently, organizations with large numbers of remote workers may need the addition of an enterprise management server solution. An EMS solution can securely and automatically share information between endpoint and the network, push out software updates, and assign security profiles to endpoints. Access to cloud applications: Driving all traffic through a VPN tunnel can actually have a doubling impact on network traffic. In addition to all of the remote workers connecting into the network, the network will also need to manage all of the outbound connections to cloud services. However, since this traffic will not be run through the organization’s edge security solutions, these direct connections will require a cloud-based security solution. Cloud access security broker (CASB) will provide visibility, compliance, data security, and threat protection for access to SaaS and other cloud-based services being used by an organization. Network access control: Cybercriminals intend to exploit this rapid transition to a teleworker strategy by hoping to get overlooked by masquerading as a legitimate corporate end-user or IoT device, or by hijacking a legitimate device. Network access control tools can see and identify everything connected to the network, as well as control those devices and users including dynamic automated responses. Network access control enables IT teams to see every device and user as they join the network, combined with the ability to limit devices access in the network, and automatically react to devices that fall out of policy within seconds. Network segmentation: Network segmentation ensures that devices, users, workflows, and applications can be isolated to prevent unauthorized access and data loss, as well as to limit exposure if there is a breach at the network perimeter. Next generation Firewall enables segmentation at the network perimeter further this can be enhanced using an internal segmentation Firewall. Zero-trust network access: The best security posture during this period is to consider that every user and device has already been compromised. Combining all of the solutions outlined above organizations can ensure…

Read More

SATATYA SIGHT Mobile Application for Network Video Recorder

Matrix SATATYA SIGHT is a comprehensive video surveillance application for mobile devices. It is designed for smartphones and tablets running on popular operating systems such as Android and iOS. It connects to multiple SATATYA recording devices such as NVR and HVR and offers the view of all locations and cameras on a single window. Features Add up to 50 recording devices. No public IP needed.  Call from mobile app. Complete access to all recorded videos. PTZ control. Take snapshot while watching live video. Access high importance cameras with single touch.  

Read More

The Road to Recovery for Private security Industry

The state of wellness of private security industry (PSI) is directly related to the health of Indian economy. Finance is the lifeline of any business, and if the revenue generation pipeline gets dry, the businesses cannot survive. The COVID shock has been so sudden that the road to recovery has become very rocky and bumpy, marred with multiple intangibles, and full of hurdles. The statistical data unleashed by the RBI Governor only spells gloomy economic scene slipping into recession with negative growth of GDP as all indicators appear to be nosediving, and thereby fragility of Indian economy has come to the surface. The short term quick-fixes can only ease the situation temporarily as full-fledged recovery in long term requires a sound road map built on many unorthodox and out of the box measures resulting from the equations needed to be made between GOI and states, PE and security provider, micro enterprises and the migrant labor, MSME and Banks and so on. We have tried to put the rail back on track but now we may have to lay the new tracks to restore its stability, speed, and over all comfort to all stakeholders in the journey.   THE HURDLES The hurdles in the journey to the recovery are visible on the wall in ‘big and bold’ letters and can best be summarized as under: Lack of coordination between the Central Government and certain State Governments – their muscle flexing and incoherent and shifting strategies. The murky handling of issues of migrant labor such as false promises of salary and food, and no demand of rent during the lockdown period and directives to this effect. Their subsequent reversal led to the despair and exodus of migrant labor leaving the factories and production lines without workforce. Abrupt disruption of demand and supply chain due to the direct impact of lockdown that was clearly punctuated with near term uncertainty. The ‘poor to no’ visibility in reversal of cycle of manufacturing and service sector post lockdown due to domestic and global fragmentation of demand and supply chain and also for the possibility of migrant labor returning to work in delayed time-frame. Failure of financial stimulus and its sluggish implementation to trigger economic stability. The extension of moratorium on payment of loans to the banks also added to woes of the banks and liquidity in the financial sector. Lack of any definite time-line in the discovery of vaccine against CORONA infection despite the global efforts by the pharmaceutical companies is another dampener. Non-flattening of the COVID curve and unprecedented spike in daily cases of CORONA infection despite over 70 days of lockdown is a cause of constant worry. The casual and irresponsible behavior of certain cross section of citizens towards police, doctors and other health workers in fight against CORONA added retrograde steps and undesired controversies. Fishing in dirty waters by the political parties during such turbulent times has led to misinformation campaigns which added pain to the poor, confusion in the social media, and exposed them of their falsehood of little care for the cause of poor. The devastation and misery inflicted by Amphan cyclone in states of West Bengal and Odisha, and Nisarg in Maharashtra and Gujarat have also added to the barriers on the road to recovery. Delayed or lack of pro-activeness in luring the Japanese and American companies from China to India.   THE HORIZON The horizon for the PSI looks hazy as the impact of pandemic is unprecedented and un-paralleled. It has inflicted deep rooted fear psychosis and behavioral changes in the mass and entrepreneurs. The wheels of economy like travel and tourism, transportation, education, hospitality and entertainment, shopping, manufacturing and servicing will be subjected to the new normal and will have to tread with caution to come to the original scale and volume. These are the sectors of hope and revival for PSI as banking and financial sectors are the only source of oxygen for survival and lease of life during the crisis. The conflict of interest between Mall owners and retailers over rentals for lock down period remains unresolved. PSAs are still contesting with PE for fulfilling their obligations. The travel and tourism is likely to ignite the demand for railways and domestic air travel which in turn will generate demand for hospitality and entertainment. Consumption will fuel the manufacturing and servicing. The PSI will have to traverse the parallel path with unlocking of economy as it unfolds.   THE SILVER LININGS  To my mind, despite the above, there are some silver linings which can still be counted:  High degree of rate of recovery of COVID patients.  The relative low fatality rate of COVID patients in India – exception being the high risk groups with pre-existing co-morbidities.  Likelihood of good and timely monsoon as predicted by IMD.  Bumper crop output from agriculture sector and adequate buffer stock of food grain.  Proactive role of RBI and presence of adequate Forex reserves.  Likelihood of consumption demand surging from rural areas.  Lack of jobs in rural areas will force migrant labor to rethink and result into their return to work.   CONCLUSION To keep afloat the PSA and PSI have limited options to keep searching for avenues of expansion of revenue growth, keep engaged with the existing clients, resort to cost cutting, pruning of work force in offices, aggressive collections strategy, remote delivery of training, adoption of new technologies and processes, and wait & watch for wheel of economy to rumble on new track with new normal. However, the entrepreneurial and fighting spirit of the PSI will ensure that they not only weather the challenges of COVID times but will emerge stronger than ever before.  

Read More

Networks Thermal Cameras for Elevated Body Temperature Screening

Given the current Covid-19 pandemic, thermal cameras are receiving increasingly more interest. It is a natural idea to utilize a thermal camera to detect elevated body temperatures. Right now, the Internet is full of information on the subject (including brand new companies), but it’s difficult to understand what is real, what is wishful thinking and what is exaggeration. At Eagle Eye Networks we have purchased a number of thermal cameras and have run a series of tests to determine what is practical with today’s technology. This document details some of the testing we have done and some of our conclusions. We do not claim that our testing is comprehensive or perfect, but we hope, that in sharing it, we can help. This document focuses on the application of thermal cameras to read human body temperature. However, it is important to note, that before the Covid-19 pandemic, thermal cameras, at least as it relates to video surveillance, were primarily used for detecting perimeter breaches. This use case does not require the same level of precision that a thermal camera detecting an elevated body temperature requires. Therefore, typical general-purpose thermal cameras in the market have an accuracy of +/- 5 degrees Fahrenheit, which is not accurate enough to detect elevated body temperatures. It’s also important to note that elevated temperature screening is not screening for coronavirus or for any other illness. In fact, some people who have a virus or illness may not have an elevated body temperature. Additionally, the majority of thermal cameras are not approved for medical use or approved by the FDA, but they may be well suited to provide an initial reading to allow appropriate personnel to perform follow up evaluation and potential diagnosis. Executive summary Thermal cameras can be used to detect elevated temperatures in humans under the right conditions. Creating those conditions can be challenging, but it’s not impossible or impractical. Our experience in testing has shown that the preferred solution includes cooperative subjects and limits measurement to a small number of people simultaneously. Given appropriate conditions we have tested cameras and found they consistently report temperatures within +/- 0.7 degrees Fahrenheit of measurements taken with a traditional thermometer. System components There are various systems in the market place; however, most cameras that are connected to a traditional surveillance system include these: Camera – Thermal and Visible Spectrum. Thermal Calibration Unit (blackbody). Recording System/ Video Management System. Local Display Device (optional). Cameras Some of the more advanced thermal cameras are effectively two cameras in a single housing, these are known by several different names – dual spectrum and bi-spectrum are the most common names. The image below (Figure 1) is a dual spectrum camera from Sunell that was designed to resemble a panda bear. This was originally deployed in Chinese schools where children would look at it as they entered. Each camera produces a video stream, the visible spectrum camera works like most typical surveillance cameras. The thermal camera produces an image that is a visual representation of the different temperatures it has detected. These images can be either in grayscale or in color. Most cameras have several visual choices for how to represent the thermal data. The images above (Figure 2) are from a dual spectrum thermal camera connected to the Eagle Eye Cloud VMS. This is a traditional video surveillance dual spectrum thermal camera, not a camera used to detect elevated body temperatures. There are a few things to note about the images. One is that the field of view is different. The visible camera can capture a wider field of view than the thermal camera. The visible camera has two vehicles in the field of view while the thermal camera only has one. The visible camera captures the street at the top of the image, while the thermal camera does not. The difference in camera field of view is quite common. Also, the thermal camera has a much lower resolution. The figures appear more ‘blocky.’ Thermal cameras today are generally much lower resolution than visible spectrum cameras.   Thermal calibration unit A thermal calibration unit, sometimes referred to as a blackbody, is a device that maintains a specific temperature and does not reflect any energy from the surroundings. It is used as a constant point of reference for the thermal camera. Not all thermal cameras require a calibration unit, but many can make use of them if they are present. A calibration unit requires electrical power, but is not wired to the camera or the VMS/ recorder. It is manually set at a prescribed temperature, and the thermal cameras are configured based on that temperature. Thermal calibration units are typically used when more precise temperature readings are required such as in elevated temperature screening. Some suppliers include a thermal calibration unit with the sale of the camera, but most do not. Calibration units are generally not present for most cameras connected to a video surveillance system. Many security industry personnel are not familiar with thermal calibration units or their use. Recording system/ video management system The cameras are generally connected to a recorder. For this discussion we utilized the Eagle Eye Cloud VMS with its enhancements for support of elevated temperature screening. The cameras are connected to an Eagle Eye Bridge. As shown above (figure 2), The Eagle Eye VMS records both the visible spectrum camera as well as the thermal camera. Additionally, Eagle Eye VMS captures the temperature measurement data that the camera generates. This means that the temperature is associated with specific to me, so searches can be performed based on the temperature, time or person. Notifications can be generated if the temperature is outside of a specified range. In other words, if the temperature is too high, a notification can be made. The notifications can be delivered via various methods, but the most common is via email. Typical notifications will have an image of the person, the temperature detected, as well as name and location of the camera that…

Read More

A Deeper Dive into Security of Embedded System

  INTRODUCTION Scope and purpose of this white paper The scope of this white paper is the security for embedded electronic systems and IoT systems, which are generally based on programmable microcontrollers. Examples are electronic consumer and industrial devices, IoT sensors, medical devices. The purpose is to stress the fact that although security countermeasures are necessary to protect embedded systems and IoT systems, they are unfortunately not sufficient to avoid surface attacks. Embedded systems and IoT systems are more and more exposed to a wider range of new security threats, and this trend will very probably accelerate. To prevent damages from security attacks, companies are taking measures to protect their assets, including more specifically their software IP. Unfortunately, in ecosystems where the supply chain is getting more complex, it is frequent that the ones deciding the security levels are not the ones that will be accountable for their choices. Even when security measures have been duly selected and implemented, facts are showing that there are still some underlying vulnerabilities. On average, security experts will break security of more than 80% of implementations during their evaluation phase, for multiple reasons: Security attacks are getting easier to set-up, even by players who have limited technical skills and could use tools available on the web. It costs just a few dollars to launch massive DDoS attacks capable of generating up to 300Gb/s. Security countermeasures have their own limitations, and having an overreliance on those countermeasures could lead to potential hidden security risks. Security implementation matters. Technical challenges in implementing security could potentially lead to vulnerabilities exploited by hackers. A good approach is to do a formal security evaluation with security experts. However, before taking this path, it will be efficient and cost effective to have a second view with a deeper dive into security. In most cases, it will highlight some vulnerabilities and will provide useful guidelines to improve the resistance of embedded systems against security attacks. In this whitepaper, we will: Describe the most frequently used security countermeasures. Review the limitations of these countermeasures and explain why a deeper dive is recommended. Share the views from our security experts. The benefit of this deeper dive is to reduce exposure to security attacks without having to reconsider the whole security approach. Security principles Basic principles It is widely accepted that security must rely on 3 basic principles: Security by design (and not after the facts). End to end security (at OT and IT levels). Security all along the product life. The last one is equally important compared to the first two. We observe that several electronic industries are getting conscious about the security by design and end to end security, and are not considering the importance of security all along the product life. For instance, having a secure mechanism for firmware update over the air (OTA) will prevent a lot of security breaches. Deeper dive I t would be great if a simple application of those basic principles will be enough to counter any potential security attack. Facts are showing that even by applying those principles, there are still remaining vulnerabilities exploited by hackers. Embedded systems are all different and have their own specificities; on the other side, security requirements vary considerably depending on market, applications or risk management policies. Considering that security must be scalable, and that no security scheme fits all, we recommend a deeper dive into security to ensure that the security schemes have been implemented in adequation with the system architecture. A strong security scheme which has not been properly implemented is simply useless. We will explain in this white paper the reasons why these basic security principles are necessary and not sufficient. Disclaimer The information in this white paper provides general information and guidance about cybersecurity; it is not intended as legal advice nor should you consider it as such. WHY DOES A DEEPER DIVE INTO SECURITY MAKE SENSE? Security attacks on embedded systems are getting more frequent There are several reasons that could explain why embedded and IoT systems are getting more vulnerable to security attacks: Systems complexity Embedded and IoT systems are becoming more and more complex due to rich, broad and diverse ecosystems which could be interconnected with each other’s. IoT ecosystems are an illustration of this trend; they include a wider range of technologies like sensors, gateways, networks, clouds with many different standards and limited regulations on security. Limited capacities in devices Many embedded and IoT systems are based on programmable microcontrollers with limitations in processing power and memory storage. Several security countermeasures have not been designed based on those limitations. As a result, they require compromising between security and performance, and most of the time the decision is in favor of the last one. Human errors are always possible The development of new technologies is accelerating, and we do not have enough background of previous threats to know enough about failures in protection. This is leading to an increase of human errors in life of a product – at the design stage, at manufacturing stage and during the implementation of security. Time to market and costs Generally, manufacturers shorten the launch time of products, putting higher priorities on volume of sales, and not always considering fundamental security best practices such as security by design. Security is often seen as an additional cost; this is why, in order to reduce costs, manufacturing companies are also limiting or ignoring security features in their devices. The result would be equipment that can never provide adequate protection. Any countermeasure has its own limitations Deciding a security strategy often means making compromises between risk, cost and time – the easier approach is to rely on legacy security mechanisms proposed by silicon and IP vendors, network providers or other third parties in the value chain. The issue with this approach is that there is no ‘one size fits all’ security solution that can protect any embedded system. The characteristics of each system is different and should be considered…

Read More

Remote Working Protect Your Active Directory Logins

The past couple of weeks have been intense for most companies since they had to shift to working remotely. This situation is unfortunately a huge opportunity for cyber-attackers. Remote connections mean more vulnerabilities to exploit. Active Directory (AD) is the main identity and access platform for companies around the world. If you want to secure your network you need to protect the remote use of AD credentials. Phishing aimed at the most vulnerable As if it was not enough on its own, the recent coronavirus outbreak brought with it a lot of new phishing email campaigns. The attackers are aiming at the most vulnerable users – just like the disease itself – your new remote employees. Using public fear to lure their victims is their main strategy. They send URLs or document to download of safety recommendations or infection maps. The probability of users clicking on a link or downloading an attachment is higher than ever. Basically, hackers are after a set of compromised credentials which they can use to access a network and move laterally within it to locate anything valuable that can be exploited. Even worse, similar to the coronavirus, you might not even know you’ve been touched. The Ponemon Institute says that 191 days is the average data breach discovery time. The threat surface is growing Now more than ever, your organization might be at high risk if you don’t have a sufficient protection of Active Directory connections. Most companies have been forced to work remotely which has expanded rapidly the threat surface. This risk is higher when we know that most companies weren’t ready for it, they had no time to prepare whatsoever. What they did is that they rushed to allow Microsoft remote desktop (RDP) access so that their employees would be able to access desktop resources remotely. Understandable enough, companies’ priority has been the continuation of operations. Cybersecurity didn’t get the attention it deserved. Remote Active Directory logins security RDP access is unfortunately not fully secure, it is only protected by a single password. Here are three recommendations to protect those sessions:  Strengthen passwords.  Use a Virtual Private Network (VPN) for all remote sessions. Enable two-factor authentication on these remote sessions. These 3 steps will allow you to significantly improve the security of your remote employees. For more security and to fully minimize the risk, find below a full list of recommendations written by experts: Remote working equipment policy: The best thing is to use the devices available, secured and controlled by your organization. If this is not an option, you should give clear usage and security rules to your employees working from home. Make sure to secure your external access: To do so, use a VPN (Virtual Private Network). Once this is done, and if you can, limit VPN access to only authorized equipment to strengthen security. If anyone tries to connect from a ‘non-authorized’ device, login must be denied. Strong password policy: To be strong and safe, all your passwords must be long, complex and unique. However, passwords will only be vulnerable. To address those vulnerabilities, activate two-factor authentication on all remote sessions, especially for connections to the corporate network. Deploy security updates: Whenever they’re available they need to be deployed on all pieces of equipment in your information system. If you don’t, attacker scan quickly exploit those vulnerabilities. Backup of data and activities: After an attack, backups might be the only way for your company to recover its data. Perform and test backups on a regular basis to make sure they are working. Use antiviral solutions: A professional antiviral solution helps protect your company from viral attacks, but also sometimes from phishing, or from some ransomware. Logging of the activity and access: Systematic logging of all access and activities of your workstations and equipment (servers, firewall, proxy…) will give you information on how a cyber-attack happened, its extent and how to remedy it. Supervise the activity of external access: It’s important to be able to detect suspicious access, it could represent a sign of an attack. To be able to detect those, you need to monitor all your remote sessions and access to your files and folders. For even more security, real-time alerts and immediate reactions are a great way to act before damage is done. User awareness: Your remote employees must be given clear instructions on what they can or can’t do. They are the first barrier to help you avoid/ detect attacks. Be ready for a cyber-attack: Perfect security doesn’t exist. No organization, whatever its size, is immune to cyber-attacks. If you anticipate by assessing the possible scenarios, you can take the necessary measures to protect your organization. Managers must be involved: They have to be implicated and responsible when it comes to security. It’s important in order to ensure employees’ adhesion.  

Read More

Role of Private Security in Current Pandemic Situation

Rapid all-round advancement and growth over last few decades combined with grave security incidents such as 9/11 tragedy has called for better security of assets at workplace, in transit, as well as at places of residence. Yesteryears watchmen, transformed into professional security guards are now organised into private security services or private security industry. They outnumber the regular police force multi-times. In India, with strength of over 9 million, they are approximately five times the number of the police force. Worldwide the private security services are a multi billion dollar industry. Today the security personnel dovetailed with electronic and hardware resources are securing residential and commercial complexes, services, communications, transportation etc. They may be guarding an ATM kiosk, protecting important personalities or taking care of millions of currency in transit; they are ensuring a safe and secure environment. Although not meant to replace the regular police, they supplement them, take the load off an overburdened and over stretched police and fill gaps which the latter finds difficult to close because of paucity of manpower. The devastating coronavirus pandemic (Covid-19) is unprecedented in recent history. Last time the world faced similar devastation was in 1918 when it was hit by the Spanish Flu. Since generations have lived past that misfortune, the faded memories and forgotten lessons of 1918 pandemic have left us with scant precedence to follow resulting in slow reactions even by the most advanced nations in fighting Covid-19. Few nations have been spared by the virus owing to multiple reasons. However, amongst those affected India is one such country where hard decisions taken by the governments, strict enforcements and health compliances have saved lives and contained the spread to manageable levels. While the political leadership in India has made bold decisions and the bureaucracy laid a clear roadmap, the medical services, maintenance staff, police and essential service providers are the true heroes in fighting Covid-19. Undeterred by personal safety threats, they are fighting battles as front line soldiers. But of the many elements that are immensely contributing, the private security industry is yet unrecognised. They have been working tirelessly round the clock to ensure success of lockdowns in their respective areas of responsibility. In these challenging time it would not be out of turn to highlight their role, dovetail them with police, and employ them more proactively so that load on force is reduced thus freeing them for other important tasks. This would enable the police achieve better efficiency and address areas not yet covered. The recommendations are centred around Indian surroundings but their applicability is worldwide, and hence worth highlighting for common good of all nation states. Despite the vast majority being clear as to how the virus infects and its prevention techniques, yet many believe that the disease will not strike them. The social media to which each one of us is exposed today is also somewhat adding to negativity, and confusing and misdirecting the general public by fake forwards. Here, the security guards can take on the role of spreading authentic and official government version. The security agencies can be earmarked as the authorized communicators and the security staff can make announcements on mobile public address systems about guidelines, restrictions in place and other posts the local administration want to communicate to general public in specific areas. Handling rouge elements who have been violating government orders and threatening doctors and health care workers is another challenge being faced by the administration. Safety of these individuals while in hospitals, in transit or at their places of stay can be assigned to the private security personnel thus giving them confidence to move and work without fear. Rural and semi-urban areas are cohesive entities and people staying there still follow traditional approach while dealing with natural or man made threats. For example, to fight the threat, majority of villages there have gone back to ‘pehra’ (community guarding) system to keep away outsiders coming in as well as prevent any person from leaving the village. The ‘pehra’ committees are ruthlessly guarding and patrolling villages which has kept the disease at bay at most places. But the most affected by Covid-19 have been the built up areas, housing societies, urban clusters, markets, lanes and by lanes. Although the lockdowns are being effectively imposed by police in identified Hot Spots, on main roads and highways but when it comes to individual localities, the lockdown is ineffective as people there are defying movement restrictions. The security guards responsible for keeping people in check here are hired by societies themselves and since these private guards are on the residents ‘payroll, the latter do not pay much attention to orders being enforced by these guards. Even during these difficult times people openly refuse to listen to private security guards and behave arrogantly when checked for lockdown violations. This demoralising and discouraging of security guards manifest in low social-distancing enforcements. Since the limited police persons cannot be deployed everywhere, an alternate is swapping of roles. While private security guards can be deployed in less pressure areas such as police stations, police personnel can be relieved from there to enforce lockdown in urban societies, clusters, lanes and by lanes. The heavy hand of law will keep people restricted to their homes and thus enforce social-distancing. Like most professions security is a specialised field. Because of surplus availability of workforce these security personnel are valued less, and listened to even lesser. Every adult and every child that comes out of his/ her home has a suggestion to offer as to how the guard should sit/ stand/ work/ talk. Ideally, the minimum level to whom the security head in any organisation or locality should report to is their vice president. But invariably the security head is asked to report to the officer lower in hierarchy. The advice given by the security head is invariably brushed aside since the hierarchy considers him no better than them. This results in unprofessionalism which in turn sends confusing signals to the last…

Read More

Decreasing Networking and Storage Costs of IP Video Surveillance System

With the increased prevalence of  IP-based video surveillance systems on the market, and the growing adoption of higher resolution HD and megapixel cameras, organizations and system integrators must take into account how implementing these systems can impact their network resources. Without realistic system design considerations, organizations can risk significant network and storage cost overruns while also compromising the reliability of their network to support applications that are critical to their business operations. By implementing an advanced video management system (VMS), an organization can effectively manage video streams on their network using built-in camera and software functionalities to optimize network resources and bandwidth consumption. With such optimizations, a VMS will also help to decrease networking and storage costs over the lifetime of a video surveillance system. Challenges For organizations choosing to implement or expand an IP video surveillance system, the ability to efficiently manage video streams and storage is crucial to ensure the best use of the network and reduce costs associated with deploying and operating the system. While organizations continue to benefit from greater network speeds and capacity, the use of IP-based video systems can generate a significant increase in the amount of data traveling on their network as a result of: Deploying high-definition and megapixel cameras, Additional cameras to address a need for coverage across Larger areas, Increases to the number of users accessing video, Recording and maintaining redundant video recordings, Transferring video from one site to another to maintain long-term orcentralized recordings. When planning and designing an IP video surveillance system, an organization must take into account the unique aspects of its security environment and its business operations in order to ensure the reliable transmission of video and avoid overloading available network resources. For example, certain deployments will require greater flexibility to manage video streams and bandwidth due to their complex nature,further driving the need for advanced video management capabilities. These scenarios can include: Distributed sites requiring operators to connect to remote cameras, Cameras connected to networks with limited bandwidth such as DSL, wireless, or cellular, Sharing bandwidth with other operation-critical applications because video is not the top priority for the business. It is equally important for organizations to realize that optimizing the use of network resources does not necessarily require large capital investments but is more a matter of putting the right solutions in place. With bandwidth and storage representing important ongoing costs of operating an IP system, organization scan significantly reduce the Total Cost of Ownership (TCO) of their video surveillance system by investing in solutions that allow them to optimize their use of bandwidth and storage based on the requirements of their application. This white paper will focus on those unique and powerful capabilities that one should look for in a VMS in order to optimize the use of network resources and reduce the costs associated with operating an IP-based surveillance system. Optimizing network resource utilization VMS applications allow an organization to manage its security infrastructure including video cameras, encoders, and recording servers, within the unique context of the organization’s deployment. The effectiveness of the VMS will depend on its ability to handle the demands of the operating environment, whether those demands include deploying a system in sites with limited bandwidth, monitoring cameras across distributed locations, or ensuring that multiple operators can access necessary video streams in the case of an incident, regardless of the number of concurrent requests. Although system administrators will intuitively manage video quality settings and define recording settings and schedules, addressing the needs of a specific security department can require manual intervention and adjustment. While most VMS applications support these features, some VMS applications also support powerful functionalities and technologies that serve to further reduce the total cost of operating an IP video system. In fact, organizations can deploy a surveillance system that operates with greater efficiency on their network by choosing a VMS application that supports the following capabilities: End-to-end multicast transmission, Stream redirection and multicast-to-unicast conversion, Multi-streaming, Video caching, Archive transfer. By leveraging some or all of these capabilities, organizations can significantly reduce the number of servers required to manage and store video, reduce their network bandwidth requirements, and reliably scale their system while minimizing their investment in new infrastructure. A. Video stream transmission: unicast and multicast I n IP video surveillance, unicast and multicast are the two most commonly used methods to transmit video from cameras to client workstations. While all VMS platforms can configure unicast, only a few also offer multicast transmission, and, among these, even fewer support end-to-end multicast that provides communication from the edge device (IP cameras and encoders) to the workstation. Though many VMS platforms may claim multicast support, the majority will only provide limited support for multicast transmission between the recording server and the client station, and require multicast to be set for all cameras on the server, or even implemented system wide. It is important for organizations to consider that certain VMS provide far greater flexibility with regards to transmission, in order to implement the best design for their application. This includes the ability to set up cameras per select network branch or per viewer and the ability to automatically detect the ideal transmission method for different segments of the network, thereby allowing organizations to optimize the performance of their video surveillance system and minimize the network resources that are required. i. Unicast overview Unicast is usually done in TCP or UDP and requires a direct connection between the source and the destination. Unicast only works if the source has the capability to accept concurrent connections when multiple destinations want to view or record the same video at the same time. In IP video surveillance, unicast involves a camera streaming as many copies of the video feed as are requested by the destinations, so a 6 Mbps video stream that is requested by three operators will produce a transmission of 18 Mbps of data across multiple network segments (6 Mbps per stream x 3 requests = a total of 18 Mbps). This…

Read More