论文部分内容阅读
2014年3月27日,中央电视台报道了多起黑客利用家庭监控设备的漏洞将视频泄露至网上的事件,引起了大家的高度关注。相信在这之前不少专家早已预料到事情会有发生的一天,因为熟悉网络的人士只要稍微研究一下目前安防界普遍采用的为远程访问摄像机、录像机而设计的所谓私有DDNS系统,就不难发现其存在的巨大安全隐患。隐患转化为现实灾难的条件之一当然是用户未及时修改设备的缺省密码,或将密码设置得过于简单,但是企业也不能把责任完全推脱给
On March 27, 2014, CCTV reported a number of incidents in which hackers exploited the loopholes in home monitoring equipment to leak videos to the Internet, attracting everyone’s attention. I believe many experts have long expected things to happen before this happens because people who are familiar with the Internet are not hard to find out just by studying the so-called proprietary DDNS system that is commonly used in the field of security for remote access cameras and video recorders. Its existence huge security risk. Of course, one of the conditions for converting a potential disaster into a realistic disaster is that the user does not modify the default password of the device in time or set the password too simple, but the enterprise can not completely shirk its responsibility