In the video below, Shaun Meehan introduces us to what a TPM is and why it's important to security cameras and recording appliances in a world of widespread cyber vulnerability and hacking.
According to Bosch, security systems have transitioned into network devices over the last few decades, system vulnerabilities have transitioned as well. This shift in network utilization brings with it far more vulnerabilities than compared to older analog systems, and due to the very nature of networking the outer boundary of the surveillance system can be vulnerable to attack.
The ‘arteries’ of an IP system, the physical network connections, need to reach the edge components, namely the cameras, which are often mounted in exposed locations. Thus, these arteries and edge components need intensified protection.
A Trusted Platform Module is a self-contained system that acts like a cryptographic coprocessor to the camera system, connected to it via a serial interface. It runs its own firmware which is continuously maintained to provide optimal protection against possible threats known from the market. Its firmware is only loaded in a secure production environment, not remotely like firmware for cameras.
New Trusted Platform Module versions thus are only deployed with newly produced cameras. Communication between the camera firmware and the Trusted Platform Module chip happens via ‘Secure Apps’ inside the Trusted Platform Module.
These provide the interfaces and commands for certain functionalities. There is no possibility for the firmware or operating system to modify anything inside the Trusted Platform Module directly.
Bosch takes cyber security as related to electronic security devices seriously.
Below is more information about current security device risks and methods to secure security systems.
We've summarized the information and many of the resources to help you stay on top of this topic:
- IP Video and Data Security Guidebook
- Secure the Edge of the Network - White Paper
- 3 Common Security Hacks
- Data Security Leaflet
- Trusted Platform Modules
- Securing Data and Equipment Racks
- Encryption of Intrusion Detection Systems
- Security of Security
- Security Encryption and Certificates FAQ
- PKI CHAVE One-Page
- PKI CHAVE Leaflet
- PKI CHAVE Presentation PPT
- Lessons learned from major health care data breaches
- NIST National Cybersecurity Center of Excellence
- Contact our team for expert security advice