Protecting computer networks requires the implementation and maintenance of various security measures. Hackers and disenchanted employees are not the only threats to video surveillance systems, devices, and data. Poor procedures and processes, ignorance of policy, lack of security awareness, and inappropriate physical access to systems increase risks. Effective and efficient security plans include overlapping measures within the computer network.
The physical types of network security provide protection from fire, unauthorized access, and/or natural disasters. Restrict physical access to systems, routers, firewalls, etc. by combining the use of high quality locks with secondary verification systems, such as biometric scanners. Security guards, video monitoring and alarms are other ways to help keep areas secure. Password-protect and monitor physical access to all systems to ensure that only authorized user’s access data. Invest in fire detection and waterless fire suppression systems to protect data and equipment from damage.
Perimeter protection refers to the devices that separate your network from the rest of the world. Firewalls are the most commonly implemented perimeter security devices. Application and appliance-based firewalls block certain types of data from entering and leaving your network using standard and user-defined filters. Another important part of perimeter security is the implementation of encryption and protocols to protect the wireless network from unauthorized access.
Scanners, sniffers and analysis tools give the trained administrator insight regarding system vulnerabilities. Many hackers use these tools to find weaknesses in network security. Port scanners reveal open ports, which may lead to the discovery of unnecessary or compromising services or applications. Monitoring keeps those responsible for network security informed about the types of data and network events that take place on the network. Baselines are established over time during routine scanning and monitoring. Deviations from the baseline are clues to new and possibly compromising events on the network.
Network Security Hardening Guide
GovComm systems and equipment are designed to withstand hurricane force winds, extreme temperatures, electrical transients, vibration, and shock.
Networks designers and installers should heed best practices by:
- Calculating and adhering to wind load constraints
- Verifying that equipment specifications and performance are within the project’s scope
- Following GovComm installation instructions
Utilize shielded network cables between the power source and the equipment to provide a path for a power surge to reach the ground.
For installation on a building, the equipment must be bonded (that is, provided with a low impedance connection) to the building’s structural earth ground system. For installation on a metal pole with a proper ground system at the base, the equipment must be bonded to the pole. For installation on non-grounded or insulated support, the equipment must be grounded with an adequate ground strap or wire between the device and a nearby ground system, or to a ground system installed at the base of the support. Failure to adequately ground the equipment may lead to failure. This applies to low voltage (i.e. PoE) as well as to 115 VAC power.
It is always recommended to use a “clean” power source such as an uninterrupted power supply that also blocks surges and stabilizes transients.
Failures due to surges are not covered by the warranty, as they are not due to defects in material or workmanship, and it is the installer’s responsibility to meet these grounding requirements.
Equipment installed in uncontrolled environments requires an adequate ingress rating. Equipment installed outdoors must be specifically rated for outdoor use to avoid risk to the equipment and voiding the warranty.