SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 Sets Sales Record In Security Market
    • A Landmark Gathering Shaping The Future Of Real Estate, Investment, Sustainability & Design
    • IDIS Launches New AI PTZ Cameras With NIR Performance
    • Leuze AI Boosts Optical Distance Sensor Accuracy
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • Self-Service Access Control
  • AI special report
  • Cybersecurity special report
  • 6
Retail security
  • Home
  • About
  • White papers
  • Case studies
  • News
  • Expert commentary
  • Security beat
  • Round table
  • Products
  • Videos

Check Out Our Special Report On Cybersecurity

Read now!

The Internet Of Things Presents New Cyber-vulnerabilities

Mike Sussman
Mike Sussman
Contact company
Contact TDSi
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • IoT increases cyber-vulnerabilities by transitioning from proprietary protocols to IP-based systems.
  • Brute force attacks on IoT devices easily compromise security due to insufficient safeguards.
  • Strengthening cybersecurity policies and collaboration is essential for defense against evolving threats.
Related Links
  • The Internet Of Things Presents New Cyber-vulnerabilities
With the power of modern computers, it wouldn’t take too much to run a brute force attack to obtain the password
Companies need to increase the knowledge within their business on the range of cyber-vulnerabilities

At one time, embedded devices, such as access control components communicating with application software, used proprietary protocols like RS485. Use of proprietary protocols kept these devices safe from attack. However, in this article TDSi Technical Director Mike Sussman explains that the growth of the Internet of Things (IoT) involves a move toward IP-based systems and open standards that leaves modern systems, including embedded devices, more likely to be targeted by a wide range of criminals.

Cyber-Attack ‘s Impact On IoT Devices

So, what exactly are the vulnerabilities and impact on cyber-attacks on IoT devices? Let me give you one example. In a typical access control system, if someone tries to enter an invalid PIN more than four times, then the reader would be locked and an event raised upon which action can be taken. What about invalid passwords when logging in to an embedded system? I bet that the majority of systems will let you keep trying without any preventative shutdown measures in place. With the power of modern computers, it wouldn’t take too much to run a brute force attack to obtain the password and therefore gain access to the device. In fact, at the recent Mobile World Congress, a leading security expert used a brute force attack to gain access to poorly protected CCTV cameras. You might say that this doesn’t impact security; however, if I were to say that one camera was in a primary school and another monitoring retail tills and payment terminals, would this change your mind?

Adoption of policies such as Cyber Essentials, a key Government requirement for those supplying them, as well as increased security policies such as ISO27001 and membership of bodies such as the Cyber-security Information Sharing Partnership (CiSP) should be the norm for anyone working within the security field

Is Security Industry Prepared For Breach In Cybersecurity?

Do we, as an industry, address these issues? I’d say that at the moment very few companies are addressing this level of detail (but I bet some will now!). The industry is changing, and there is a lot of focus on identity fraud and preventing physical access to buildings; however, we now need to look at what can happen when people take over the access control system remotely – open doors (or even lock personnel inside). It is fairly easy to utilize “off-the-shelf” embedded processing boards and build an embedded device with no security. Unless you work within the security field you might not even think of these threats and just concentrate on the application.

Ways To Tackle Cyber-Threats

So how do we address this? Companies need to increase the knowledge within their business on the range of cyber-vulnerabilities and keep abreast with what is happening within the threat landscape. Adoption of policies such as Cyber Essentials, a key Government requirement for those supplying them, as well as increased security policies such as ISO27001 and membership of bodies such as the Cyber-security Information Sharing Partnership (CiSP) should be the norm for anyone working within the security field. Unfortunately, this is not the case.

All companies should increase their cyber knowledge and ensure that there is a security specialist within the development teams. Increased testing of embedded devices through the likes of penetration testing also helps to identify vulnerabilities and, once resolved, increases security.

These are interesting times, and even more challenging than in the past because the attack landscape is constantly evolving. As an industry, we need to work together to share knowledge and experience that will keep us one step ahead of the attackers.

Stay ahead of the trends on securing physical access control systems through layered cybersecurity practices.

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • School security
  • Retail security
  • Cyber security
  • Internet of Things (IoT)
  • Related links
  • Mobile World Congress 2015
  • TDSi Access control systems & kits
  • TDSi Surveillance cameras
  • TDSi IP cameras
  • TDSi Access control readers
  • TDSi IP Dome cameras
  • Articles by Mike Sussman
  • Related categories
  • Access control systems & kits
  • Surveillance cameras
  • IP cameras
  • Access control readers
  • Dome cameras
  • IP Dome cameras
Related white papers
Physical Access Control

Physical Access Control

Download
Precision And Intelligence: LiDAR's Role In Modern Security Ecosystems

Precision And Intelligence: LiDAR's Role In Modern Security Ecosystems

Download
Verkada Workplace Safety Survey

Verkada Workplace Safety Survey

Download
Related articles
Securitas UK & Hays Travel Partnership Milestone

Securitas UK & Hays Travel Partnership Milestone

AIoT At Hikvision's Bangkok Summit: A Global Insight

AIoT At Hikvision's Bangkok Summit: A Global Insight

Hanwha Vision Opens AI Experience Centre In Paris

Hanwha Vision Opens AI Experience Centre In Paris

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Retail security
  4. News
  5. Expert commentary
About this page

Boost security with AI-driven video analytics, enhancing threat detection and assessment, enabling faster response-time, and promoting public safety.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Enhancing Physical Access Control Using A Self-Service Model
Enhancing Physical Access Control Using A Self-Service Model
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec