Canon CR-N500 Remote Camera Settings Guide - Page 112

Security Measures

Page 112 highlights

Security Measures If the camera is connected to a network and used, it may become a target of cyber attacks such as unauthorized access from unintended third parties. Since this camera has a variety of server functions built in, although they can be convenient, there is a risk of being attacked by a third party unless operated with security measures. To completely eliminate all risks is impossible, however, by studying various risk angles and taking measures based on the security policies, it is possible to decrease the risk of cyber attacks. This section explains the security hardening measures to the camera settings. Refer to this section and implement necessary measures according to the environment under the customer's responsibility, which will lead to safer camera operation. System administrators are advised to read. Important To the full extent permitted by laws and regulations, neither Canon Inc. nor any of its subsidiaries or affiliates shall be liable for any losses, direct, incidental or consequential damages, or liabilities that may be incurred as a result of network security incidents such as unauthorized accesses. The security hardening measures explained in this section are mainly for the cameras, which are a part of an entire system as shown in the figure below. For the entire system's security hardening, measures must be taken according to the customer's network environment and/or purpose of the camera use. Internet Controller Camera Router PoE Hub This section mainly explains the security hardening measures possible for the camera's functions and settings. Computer Computer Local Network Area In order to reduce the security risk, it is effective to block access physically and/or virtually if it is unnecessary to be made accessible from an external network, such as the internet. When access from a remote location is unnecessary and the devices accessing the camera can be limited, using only specific devices in the same local area network will enhance security. When it is necessary to access the camera from a remote location, it is important to use a method that can communicate safely, such as using a VPN (Virtual Private Network) that can block access from the outside. 112

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119

112
If the camera is connected to a network and used, it may become a target of cyber attacks such as unauthorized access
from unintended third parties. Since this camera has a variety of server functions built in, although they can be convenient,
there is a risk of being attacked by a third party unless operated with security measures. To completely eliminate all risks is
impossible, however, by studying various risk angles and taking measures based on the security policies,
it is possible to decrease the risk of cyber attacks.
This section explains the security hardening measures to the camera settings. Refer to this section and implement
necessary measures according to the environment under the customer's responsibility, which will lead to safer camera
operation. System administrators are advised to read.
The security hardening measures explained in this section are mainly for the cameras, which are a part of an entire system
as shown in the figure below. For the entire system's security hardening, measures must be taken according to the
customer's network environment and/or purpose of the camera use.
In order to reduce the security risk, it is effective to block access physically and/or virtually if it is unnecessary to be made
accessible from an external network, such as the internet.
When access from a remote location is unnecessary and the devices accessing the camera can be limited, using only
specific devices in the same local area network will enhance security. When it is necessary to access the camera from a
remote location, it is important to use a method that can communicate safely, such as using a VPN (Virtual Private Network)
that can block access from the outside.
Security Measures
Important
To the full extent permitted by laws and regulations, neither Canon Inc. nor any of its subsidiaries or affiliates shall be liable for any losses,
direct, incidental or consequential damages, or liabilities that may be incurred as a result of network security incidents such as
unauthorized accesses.
Internet
Controller
Router
PoE Hub
Computer
Computer
Camera
Local Network Area
This section mainly explains
the security hardening
measures possible for the
camera's functions and
settings.