The security of each entry point into a Wireless Security Cameras deserves some attention. Because remote access concentrators create entry points into a network, they may require independent firewall rules and monitoring systems. Also, enterprises that provide dial-up access have found that intruders connect through their modem banks using stolen usemames and passwords. However, many enterprises cannot afford to install a firewall or intrusion detection system to detect problems on their dial-ups. As a result, stolen dial-up accounts can go undetected for long periods until this becomes a major problem. Additionally, although caller-ID can be useful for investigating these types of incidents, some enterprises cannot afford the additional expense.
More enterprises are deploying as more Home Security Cameras devices are being used, as the cost of wireless access points decreases, and because of the resulting reduction in cabling costs. Although emerging wireless standards have enhanced security features such as port-based authentication in 802.Ix and tagging for wireless users in 802.1 Iq, most enterprises are deploying wireless networks based on 802.11b standard, despite its security problems. In addition to the configuration of wireless Access Points, the three primary issues relating to wireless security are authentication, encryption, and security management. Encryption of wireless traffic is critical given the increasing number of tools available for eavesdropping on network traffic. Wired Equivalent Protocol (WEP) is not effective because of security weaknesses and lack of end-to-end security; it only encrypts between the client and access point. Advanced Encryption Standard is stronger but also does not provide end-to-end security between client and network resources. Furthermore, both only support limited roaming. Also, given the distributed nature of wireless networks, some form of centralized management of devices and user accounts/rights is desirable. Security based on MAC addresses is not flexible enough for most higher enterprise environments, because it does not accommodate the need for individuals to use their own various wireless devices. Additionally, MAC address spoofing enables unauthorized access.
A Wireless Security Camera System can be used to provide a low-cost solution for wireless security that enables authentication, network segmentation, and encryption between clients and a VPN concentrator. Although this approach does not provide end-to-end encryption, it is sufficient for most purposes because the traffic is protected while it is transmitted through the air and from the wireless access point to the concentrator. For added protection, when accessing secure resources from wireless networks, it is advisable to require use of cryptographic protocols such as IPSec, SSH, or TLS to provide end-to-end encryption.
More information at http://www.jimilab.com/