CSI: Video surveillance converting the juggernaut · CSI: Video Surveillance - Converting the...
Transcript of CSI: Video surveillance converting the juggernaut · CSI: Video Surveillance - Converting the...
![Page 1: CSI: Video surveillance converting the juggernaut · CSI: Video Surveillance - Converting the Juggernaut Building Technologies | BT-SC/MKP8.1 | 2018-05-18 © Robert Bosch GmbH 2018.](https://reader030.fdocuments.net/reader030/viewer/2022040221/5e3472dce50eff3dfe001afa/html5/thumbnails/1.jpg)
CSI: VIDEO SURVEILLANCE
CONVERTING THE JUGGERNAUT
![Page 2: CSI: Video surveillance converting the juggernaut · CSI: Video Surveillance - Converting the Juggernaut Building Technologies | BT-SC/MKP8.1 | 2018-05-18 © Robert Bosch GmbH 2018.](https://reader030.fdocuments.net/reader030/viewer/2022040221/5e3472dce50eff3dfe001afa/html5/thumbnails/2.jpg)
CSI: Video Surveillance - Converting the Juggernaut
Building Technologies | BT-SC/MKP8.1 | 2018-05-18
© Robert Bosch GmbH 2018. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.3
The Market and the Trend
Global market for
IP cameras
CAGR 20%+
Video data more connected
Cyber security market (2020):
USD 170.21 billion,
CAGR ~10%
Tons of data to be processed - Skyrocketing video data
Storage market (2020):
USD 18.28 billion,
CAGR 22%
![Page 3: CSI: Video surveillance converting the juggernaut · CSI: Video Surveillance - Converting the Juggernaut Building Technologies | BT-SC/MKP8.1 | 2018-05-18 © Robert Bosch GmbH 2018.](https://reader030.fdocuments.net/reader030/viewer/2022040221/5e3472dce50eff3dfe001afa/html5/thumbnails/3.jpg)
CSI: Video Surveillance - Converting the Juggernaut
Building Technologies | BT-SC/MKP8.1 | 2018-05-18
© Robert Bosch GmbH 2018. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.4
Introducing Bosch Group - Key facts for 2017
manufacturing sites
276
associates incl. 62,500 in R&D
400,500*
in sales
€78 billion
Ownership
92% Charitable Robert Bosch Foundation
7% Bosch
family
1% Robert
Bosch
GmbH
Leading manufacturer of
security, safety and
communications solutions
and thermo technology
Energy and Building
TechnologyOne of the world’s
largest suppliers of
cutting-edge
automotive technology
Mobility
Solutions
Leadership in diverse sectors
Leading in drive and control
technology, packaging and
process technology
Industrial TechnologyWorld’s largest power tool
manufacturer and leading
manufacturer in household
appliances
Consumer Goods
We have invested more than €30 billion in R&D in the last 6 years
![Page 4: CSI: Video surveillance converting the juggernaut · CSI: Video Surveillance - Converting the Juggernaut Building Technologies | BT-SC/MKP8.1 | 2018-05-18 © Robert Bosch GmbH 2018.](https://reader030.fdocuments.net/reader030/viewer/2022040221/5e3472dce50eff3dfe001afa/html5/thumbnails/4.jpg)
CSI: Video Surveillance - Converting the Juggernaut
Building Technologies | BT-SC/MKP8.1 | 2018-05-18
© Robert Bosch GmbH 2018. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.5
Introducing Bosch Security Systems
Security
Energy Services
Building
Automation
Communi-
cations
Security & Life
Safety
Security and Safety
Systems
Energy and
Building
Solutions
Fire
Bosch Building Technologies
Key f
act
s an
d f
igu
res
2017
Wo
rld
wid
e p
roje
cts
over
the f
ive y
ears
* in round figures
![Page 5: CSI: Video surveillance converting the juggernaut · CSI: Video Surveillance - Converting the Juggernaut Building Technologies | BT-SC/MKP8.1 | 2018-05-18 © Robert Bosch GmbH 2018.](https://reader030.fdocuments.net/reader030/viewer/2022040221/5e3472dce50eff3dfe001afa/html5/thumbnails/5.jpg)
CSI: Video Surveillance - Converting the Juggernaut
Building Technologies | BT-SC/MKP8.1 | 2018-05-18
© Robert Bosch GmbH 2018. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.6
Digital Transformation Opportunities
IntelligenceAnalytics
Metadata
Multiple Sensors
Artificial IntelligenceManageability
Multiple StreamsHigher Resolutions
Ultra HDMegaPixel
Remote Access
IoT Connectivity
Data Security
Authentication
Deep Learning
![Page 6: CSI: Video surveillance converting the juggernaut · CSI: Video Surveillance - Converting the Juggernaut Building Technologies | BT-SC/MKP8.1 | 2018-05-18 © Robert Bosch GmbH 2018.](https://reader030.fdocuments.net/reader030/viewer/2022040221/5e3472dce50eff3dfe001afa/html5/thumbnails/6.jpg)
CSI: Video Surveillance - Converting the Juggernaut
Building Technologies | BT-SC/MKP8.1 | 2018-05-18
© Robert Bosch GmbH 2018. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.7
Challenges from history
Analogue past
Slow and late digitization
Decade-long lifecycles
Short-funded public/governmental operators
Mentality
Analogue video
IP video
![Page 7: CSI: Video surveillance converting the juggernaut · CSI: Video Surveillance - Converting the Juggernaut Building Technologies | BT-SC/MKP8.1 | 2018-05-18 © Robert Bosch GmbH 2018.](https://reader030.fdocuments.net/reader030/viewer/2022040221/5e3472dce50eff3dfe001afa/html5/thumbnails/7.jpg)
CSI: Video Surveillance - Converting the Juggernaut
Building Technologies | BT-SC/MKP8.1 | 2018-05-18
© Robert Bosch GmbH 2018. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.8
Shifting our own paradigm
EngineeringSEP
PSIRT
?
!
?
!
![Page 8: CSI: Video surveillance converting the juggernaut · CSI: Video Surveillance - Converting the Juggernaut Building Technologies | BT-SC/MKP8.1 | 2018-05-18 © Robert Bosch GmbH 2018.](https://reader030.fdocuments.net/reader030/viewer/2022040221/5e3472dce50eff3dfe001afa/html5/thumbnails/8.jpg)
CSI: Video Surveillance - Converting the Juggernaut
Building Technologies | BT-SC/MKP8.1 | 2018-05-18
© Robert Bosch GmbH 2018. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.9
Challenges from IP conversion
The biggest problem is the mental one
The second biggest problem is education
The impact is bigger for Industrial Video Surveillance
Naivety
Consciousness
![Page 9: CSI: Video surveillance converting the juggernaut · CSI: Video Surveillance - Converting the Juggernaut Building Technologies | BT-SC/MKP8.1 | 2018-05-18 © Robert Bosch GmbH 2018.](https://reader030.fdocuments.net/reader030/viewer/2022040221/5e3472dce50eff3dfe001afa/html5/thumbnails/9.jpg)
CSI: Video Surveillance - Converting the Juggernaut
Building Technologies | BT-SC/MKP8.1 | 2018-05-18
© Robert Bosch GmbH 2018. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.10
Keep your video data secureBosch four-step approach considering complete infrastructure
Clients
Storage devicesCameras
Public Key Infrastructure (PKI)
Even a single weak link in the surveillance set-up can jeopardize the entire system
1: Create trust
2: Secure data
3: User access rights
4: Meet IT industry standards
![Page 10: CSI: Video surveillance converting the juggernaut · CSI: Video Surveillance - Converting the Juggernaut Building Technologies | BT-SC/MKP8.1 | 2018-05-18 © Robert Bosch GmbH 2018.](https://reader030.fdocuments.net/reader030/viewer/2022040221/5e3472dce50eff3dfe001afa/html5/thumbnails/10.jpg)
CSI: Video Surveillance - Converting the Juggernaut
Building Technologies | BT-SC/MKP8.1 | 2018-05-18
© Robert Bosch GmbH 2018. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.11
Keep your video data secureOur system approach: How we secure our cameras?
Only secure connections are possible (HTTPS)
Password enforcement at initial set up
Unsecure ports for automatic discovery disabled
Unsecure remote communication disabled
Uploading of 3rd party software not possible
Firmware updates by Bosch signed and encrypted files only
Unique built-in Trusted Platform Module (TPM) safely stores
private keys
Embedded Login Firewall improves robustness against DoS attacks
Software sealing for camera configuration
Cameras(edge devices)
![Page 11: CSI: Video surveillance converting the juggernaut · CSI: Video Surveillance - Converting the Juggernaut Building Technologies | BT-SC/MKP8.1 | 2018-05-18 © Robert Bosch GmbH 2018.](https://reader030.fdocuments.net/reader030/viewer/2022040221/5e3472dce50eff3dfe001afa/html5/thumbnails/11.jpg)
CSI: Video Surveillance - Converting the Juggernaut
Building Technologies | BT-SC/MKP8.1 | 2018-05-18
© Robert Bosch GmbH 2018. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.12
Keep your video data secureOur system approach: How we secure our core devices?
Support of Microsoft Active Directory for
safe management of user access rights
Digest access authentication only
Regular updates via security patches
Servers, clients & storage devices
(core devices)
![Page 12: CSI: Video surveillance converting the juggernaut · CSI: Video Surveillance - Converting the Juggernaut Building Technologies | BT-SC/MKP8.1 | 2018-05-18 © Robert Bosch GmbH 2018.](https://reader030.fdocuments.net/reader030/viewer/2022040221/5e3472dce50eff3dfe001afa/html5/thumbnails/12.jpg)
CSI: Video Surveillance - Converting the Juggernaut
Building Technologies | BT-SC/MKP8.1 | 2018-05-18
© Robert Bosch GmbH 2018. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.13
Keep your video data secureOur system approach: How we secure communication
“Unsecure” ports disabled by default
Unsecure remote communication disabled
Password enforcement on set up
Network authentication using the 802.1x protocol
Secure renegotiation in TLS
Supports up to 256 bit keys for AES encryption
(Advanced Encryption Standard)
Network
protocols(communication)
![Page 13: CSI: Video surveillance converting the juggernaut · CSI: Video Surveillance - Converting the Juggernaut Building Technologies | BT-SC/MKP8.1 | 2018-05-18 © Robert Bosch GmbH 2018.](https://reader030.fdocuments.net/reader030/viewer/2022040221/5e3472dce50eff3dfe001afa/html5/thumbnails/13.jpg)
CSI: Video Surveillance - Converting the Juggernaut
Building Technologies | BT-SC/MKP8.1 | 2018-05-18
© Robert Bosch GmbH 2018. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.14
Keep your video data secureOur system approach: Protecting the infrastructure
Factory-loaded unique Bosch-signed certificates
on all cameras
Issued by in-house Certificate Authority (Escrypt)
Stored in built-in secure crypto-coprocessor (TPM)
Supports customer specific certificates
Supports 3rd party PKI solutions
Certificates(security infrastructure)
![Page 14: CSI: Video surveillance converting the juggernaut · CSI: Video Surveillance - Converting the Juggernaut Building Technologies | BT-SC/MKP8.1 | 2018-05-18 © Robert Bosch GmbH 2018.](https://reader030.fdocuments.net/reader030/viewer/2022040221/5e3472dce50eff3dfe001afa/html5/thumbnails/14.jpg)
Distributed Denial of Service attacks
(DDOS)
► Embedded Login
Firewall
CSI: Video Surveillance - Converting the Juggernaut
Building Technologies | BT-SC/MKP8.1 | 2018-05-18
© Robert Bosch GmbH 2018. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.15
Keep your video data secureWhat to expect?
Side channel attacks
Privilege misuse
Malware infection via firmware or third party
software
Intrusion of privacy
Physical theft
► Uploading of 3rd party
software not possible
► Firmware updates by
Bosch signed files only
► User access
management in the
cameras, recording
solutions and software
► Tamper protection
standard on all
Bosch network video
security cameras
► Unique built-in
Trusted Platform
Module
► Support of Microsoft Active
Directory
► Support of token-based
authentication
And our measures:
![Page 15: CSI: Video surveillance converting the juggernaut · CSI: Video Surveillance - Converting the Juggernaut Building Technologies | BT-SC/MKP8.1 | 2018-05-18 © Robert Bosch GmbH 2018.](https://reader030.fdocuments.net/reader030/viewer/2022040221/5e3472dce50eff3dfe001afa/html5/thumbnails/15.jpg)
CSI: Video Surveillance - Converting the Juggernaut
Building Technologies | BT-SC/MKP8.1 | 2018-05-18
© Robert Bosch GmbH 2018. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.16
How we prove to keep video data secure
“Security by Design” due to embedded Secure Engineering Process (SEP)
Continuous
vulnerability testing
External
penetration testing
Official certification
(pending)
![Page 16: CSI: Video surveillance converting the juggernaut · CSI: Video Surveillance - Converting the Juggernaut Building Technologies | BT-SC/MKP8.1 | 2018-05-18 © Robert Bosch GmbH 2018.](https://reader030.fdocuments.net/reader030/viewer/2022040221/5e3472dce50eff3dfe001afa/html5/thumbnails/16.jpg)
CSI: Video Surveillance - Converting the Juggernaut
Building Technologies | BT-SC/MKP8.1 | 2018-05-18
© Robert Bosch GmbH 2018. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights.17
Outlook
AnalyticsSmart Apps
Artificial Intelligence
Internet of Things Data Security
Deep Learning
Cloud-based solutions
Cybersecurity
![Page 17: CSI: Video surveillance converting the juggernaut · CSI: Video Surveillance - Converting the Juggernaut Building Technologies | BT-SC/MKP8.1 | 2018-05-18 © Robert Bosch GmbH 2018.](https://reader030.fdocuments.net/reader030/viewer/2022040221/5e3472dce50eff3dfe001afa/html5/thumbnails/17.jpg)
THANK YOU