SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Dahua Technology takes measures based on the OWASP top 10 web application security risks

1 Jan 2018

Dahua Technology takes measures based on the OWASP top 10 web application security risks
Contact company
Contact Dahua Technology Ltd
icon Add as a preferred source Download PDF version

The Open Web Application Security Project (OWASP), a worldwide not-for-profit charitable organisation dedicated to improving the security of software, has released the latest 2017 OWASP Top 10. This list, produced every four years since 2003 consists of the ten most critical web application security risks and is complied with the aim of keeping pace with the ever higher demands on cyber security and interconnected operating systems.

The 2017 OWASP Top 10 list is based on the examination of over 2.3M vulnerabilities which have impacted 50,000 applications, and contains two large-scale vulnerability updates and updated attack scenarios. It serves as a standard guide of potential issues or all types of users, including those from the security industry since most video surveillance applications involve viewing of video over LAN/WAN using web browser while IP cameras and recorders have a web interface to initialise and configure the devices.

Cyber security risks

Among the Top 10 risks on the list, most of the known cyber security problems in security products can be linked to 5 entries

Among the Top 10 risks on the list, most of the known cyber security problems in security products can be linked to 5 entries (A2, A3, A5, A6, A9), including broken authentication and session management, sensitive data exposure, broken access control, security misconfiguration and using components with known vulnerabilities.

To cope with the aforementioned cyber security risks, Dahua Technology, a solution provider in the global video surveillance industry, has already taken the following measures:

  • Strengthened authentication and access control: Almost every IP video device has authentication in place but weak or broken authentication can be exploited by attackers to gain control of the device. Likewise with Broken Access Control, where restrictions on what authenticated users are allowed to do are often not properly enforced. Attackers can exploit these flaws to access unauthorised functions and/or data, such as accessing other users' accounts, viewing sensitive files, modifying other users’ data, change access rights and so on. To strengthen authentication and access control, Dahua cyber security baseline has implemented the following measures. Firstly, a strong password consisting of 8-32 characters must be created. It automatically locks after multiple failed attempts. Secondly the IP address of log on clients is checked to see if they match with the session ID and can effectively filter requests not coming from the same client. In addition to that, idle sessions will be terminated to reduce risk due to users forgetting to log out. Moreover, there is a built-in mechanism to defend against brute force cracking of the session ID value.
    Dahua supports HTTPS encryption and prohibits unencrypted transmission of commands involving sensitive data
  • Guarding sensitive data : Sensitive Data is being stored and transmitted to run the application, attacker will attempt to steal sensitive information such as passwords, payment information and IDs. Dahua’s cyber security baseline implemented the following to protect sensitive data. First of all, Dahua supports HTTPS encryption and prohibits unencrypted transmission of commands involving sensitive data. Secondly, passwords stored in the device must be encrypted together with the device specific context to increase the difficulty to crack the encryption. Protect configuration data with encryption when stored, upload and download. Even authenticated users are not allowed to decode the data into clear text. Data integrity validation is conducted in both the upload and download process. 
  • Changes made to reduce misconfiguration : According to OWASP, security misconfiguration is the issue most commonly seen. Dahua has analysed past misconfiguration issues and made the following changes to reduce exposure to potential attacker. To start with, all default accounts are removed. Installer must set up a customised password during device initialisation. In addition all unused open ports are closed and an authentication mechanism is implemented to all remaining necessary open ports. Finally, Dahua has deployed cloud firmware upgrade feature to make it easier and more convenient for users to keep firmware up to date.
    Dahua has posted its Best Practices, a page offering useful tips and recommendations in detail that help to build a more secure security system
  • Human efforts to correct human errors : It is only through the combined forces of humans and machines, of customers and manufacturers and all related parties, that we can we most effectively deal with cybersecurity problems. Dahua has put a great deal of effort ensure customers will be given proper information, access to fix software and technical support to deal with vulnerability effectively. On the official website, Dahua has posted its Best Practices, a page offering useful tips and recommendations in detail that help to build a more secure security system. There is also a channel for Vulnerability Reporting, through which users and other related parties can share their clues on cybersecurity loopholes and these efforts will be rewarded after an assessment of the vulnerability.

New ecosystem of network security

Since video surveillance has become a core part of IoT, it’s not surprising that in recent years there have been an increasing amount of attacks targeting IP video devices. Thus Dahua has proposed to establish a new ecosystem of network security encompassing the end user, installers and manufacturers. In August 2017, Dahua shared a white paper regarding cybersecurity with its customers, and an updated version will be issued in early 2018.

In conclusion, Dahua has been well prepared for the battle of cyber security through the identification of application risks, potential attackers and other threats. With well thought-out precautionary plans and carefully designed coping mechanisms, Dahua can respond to risks in a quick and effective manner and solve the problems before they really become problems in most cases. With a mission to enable a safer society and smarter living, Dahua will continue to focus on “Innovation, Quality, and Service” to serve its partners and customers around the world.

Discover how AI, biometrics, and analytics are transforming casino security

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • IP video surveillance
  • Application security
  • Security camera systems
  • Industrial security systems
  • Security software
  • IP Surveillance
  • Cyber security
  • Internet of Things (IoT)
  • Data Security
  • Related links
  • Dahua Technology IP cameras
  • Network IP cameras
  • Related categories
  • Access control software
  • IP cameras
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Corporate news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec