II · Mobile security Code auditing Core competencies Wireless security Reverse analysis Protocol...

Post on 11-Jan-2020

6 views 0 download

Transcript of II · Mobile security Code auditing Core competencies Wireless security Reverse analysis Protocol...

i

I

II

III

IV

1

2

3

4

5

Dome IPC

Integrated platform

Access controller

Client NVR

Switch

Ap

plicatio

n

Laye

rTra

nsp

ort

Laye

rP

erce

ptio

n

Laye

r

Physical attack

Data leakage Data tampering

Device management

Cyberattack

Unauthorized operation

System vulnerabilityData leakage

Expired component

Configuration vulnerabilityUnauthorized update

Security Threats in the IoT

Unauthorized update

Malicious software

Unauthorized access

Expired component

Data leakage

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

https://www.hikvision.com/en/Support/Cybersecurity-Center

40