EN- Technical Partners Brochures

Ebook Genete & Axis Network encryption

Issue link: https://resources.genetec.com/i/1257803

Contents of this Issue

Navigation

Page 3 of 13

3 As with anything that resides on a network, IP security software, systems and devices are susceptible to a variety of attacks. Understanding the threats implicit in network streaming is step one. The main external threats include: • Network sniffing (eavesdropping): an adversary with access to the same network as two communicating devices can capture data packets. Any data — even sensitive and critical data — can be easily compromised if it is not protected. • Network spoofing (resource integrity): a malicious computer can impersonate a network resources luring the other part to expose sensitive information or altering the data (integrity). • Man-in-the-middle (information integrity): an adversary that is able redirect and intercept traffic has the ability to alter the communication between two parties. Specific threats for encrypting network streaming Chapter 1 Step one: understand your threats

Articles in this issue

view archives of EN- Technical Partners Brochures - Ebook Genete & Axis Network encryption