An organization uses many 802.11 PTZ (pan/tilt/zoom) cameras to monitor secure areas throughout three locations. These cameras are on the one and only SSID in each location. Each SSID uses WPA2 PSK encryption. Due to location, these cameras must use 802.11 for communication. All cameras must be accessible not only in each location but also in headquarters. As a consultant provide a list of actions the organization should take to harden these cameras.

What will be an ideal response?


Here's a list of actions you should consider:
•         Place all cameras in their own SSID.
•         Put all the camera feeds on their own VLAN.
•         Use a very long PSK.
•         Set up routine queries for camera firmware updates from the manufacturer.
 

Computer Science & Information Technology

You might also like to view...

The __________ state is when the thread has terminated.

A) ?ZOMBIE ? B) ?FREE ? C) ?STOP ? D) ?SLEEP

Computer Science & Information Technology

In a single linked list, what is the number of pointers affected by an insertion operation in the middle of the list?

a. 1 b. 0 c. 2 d. 4

Computer Science & Information Technology

The primary purpose of ____ is to enable organizations to obtain certification; thus, it serves more as an assessment tool than an implementation framework.

A. ISO/IEC 27001 B. ISO/IEC 27002 C. COBIT D. ISACA

Computer Science & Information Technology

The Chart ____________________ button allows you to show or hide specific data in a chart, such as a data series or category.?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology