期刊文献+

企业网络摄像机安全分析与技术防范

Security Analysis and Technical Prevention of Enterprise Network Camera
下载PDF
导出
摘要 网络摄像机在安防监控、人工智能等诸多方面都得到了广泛应用,但是其操作系统的网络节点设备,经常受到网络攻击或入侵的威胁。为提升网络摄像机用户的安全防护意识和技术手段,本文分析了网络摄像机常见的信息安全隐患及其可能造成的严重后果,以某型号网络摄像机的系统配置为例,阐述如何加强其信息安全防范措施,对公共场所、家庭、工业、商业等各领域做好网络摄像机信息安全防范具有一定参考价值。 Network cameras have been widely used in security monitoring,artificial intelligence and many other aspects,but the network node equipment of its operating system is often threatened by network attacks or intrusions.In order to improve the security awareness and technical means of network camera users,this article analyzes the common information security hidden risks of network cameras and their possible serious consequences.Taking the system configuration of a certain type of network camera as an example,it explains how to strengthen its information security precaution measures,and has certain reference value for network camera information security protection in public places,homes,industry,commerce and other fields.
作者 霍燚 李铁 程利 李红 Huo Yi;Li Tie;Cheng Li;Li Hong(Exploration and Development Research Institute,Liaohe Oilfield of CNPC,Panjin 124010,Liaoning Province,China)
出处 《科学与信息化》 2022年第3期101-103,共3页 Technology and Information
关键词 网络摄像机 视频监控 信息安全 network camera video monitoring information security
  • 相关文献

参考文献3

二级参考文献94

  • 1陈火旺,王戟,董威.高可信软件工程技术[J].电子学报,2003,31(z1):1933-1938. 被引量:115
  • 2赵云山,宫云战.基于符号分析的静态缺陷检测技术研究[博士学位论文].北京:北京邮电大学,2012.
  • 3Tassey G. The economic impacts of inadequate infrastructure for software testing. Gaithershurg National. Institute of Standards and Technology, Planning Report 02-3, 2002.
  • 4Sipser M. Introduction to the Theory of Computation. Boston, USA: Thomson Course Technology, 2006.
  • 5Hoare C A R. An axiomatic approach to computer program- ming. Communications of the ACM, 1969, 12(10) : 576-580.
  • 6Godefroid P, Klarlund N, Sen K. DART: Directed automated random testing//Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation. New York, USA, 2005:213-223.
  • 7Ball T, Cook B, Levin V, Rajamani S K. SLAM and static driver verifierz Technology transfer of formal methods inside Microsoft//Proceedings of the Integrated Formal Methods. Canterbury, England, 2004, 1-20.
  • 8Korel B. A dynamic approach of test data generation// Proceedings of the IEEE Conference on Software Maintenance (ICSM). San Diego, USA, 1990.. 311-317.
  • 9Korel B. Automated software test data generation. IEEE Transactions on Software Engineering, 1990, 16(8): 870-879.
  • 10Edvardsson J. A survey on automatic test data generation// Proceedings of the 2nd Conference on Computer Science and Engineering. Link6ping, Sweden, 1999: 21-28.

共引文献90

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部