Please register to participate in our discussions with 2 million other members - it's free and quick! Some forums can only be seen by registered members. After you create your account, you'll be able to customize options and access all our 15,000 new posts/day with fewer ads.
How would someone create secure network for the baby monitor or surveillance cameras? I've read stories about them getting hacked. And I stumbled upon this article on CNET (WiFi Routers: More security risks than ever)
The problem isn't so much the network, but it being on wireless and having a vulnerable router.
Personally I would buy a wired in system and have it go through a secondary router to act as it's own LAN making the outer network a DMZ. I would then set firewall rules around that inner router to lock down every port possible and only allow certain IPs from my primary network. Then I would have the monitor location force authentication.
The other option is to use some sort of VPN router and have a client/phone use a key to get in.
To have a secure network you have to keep ALL network attached devices updated and patched. If a company is too cheap or goes out of business they will not release security patches and leave a bunch of vulnerable devices on the internet.
How about leaving the door to the kid's room open and getting a surveillance dog?
The OP's note was completely incomprehensible to this antique.
What about those who want a nanny cam for when they have a babysitter watching their child? Secondly, depending on the layout of the home, you may not hear the child. Some homes have the master on the 1st floor and the other bedrooms upstairs. Some homes have the master on one side and the other bedrooms on the other side of the home. A surveillance dog won't be able to tell you that someone has broken in while you're away.
Specifically, the people in the article were vulnerable because they had outdated firmware on the camera. So in those cases, that specific attack could have been prevented by simply updating the firmware.
With regards to the original question - its hard to answer as there is really no one size fits all formula. Its essentially putting the right controls in the right place. But what controls, where, and how are different depending on various factors of the network. As the article pointed out, one of the families had controls in place (firewall, locked down APs, etc.). Yet, because of the exploitable firmware that was running on the camera, those controls were useless.
The one constant is to assess the network. What's going out and what's coming in? How is the traffic coming in protected/validated? Not saying you need to treat your network like a major financial institution - but certainly adopting some general guidelines won't hurt either.
There are couple elements to prove a baby is healthy and alive ie
Sound of breathing(sound wave)
Blood pressure or Heart Rate (Pulse)
Video and Image is only good for intruders prevention, but are you going to wacth video every second?
So an App to let people hear breathing constantly through earphone and view Blood pressure or Heart Rate (Pulse) from time to time would be much useful.
I wonder how many hackers would be interested in these stuff other than obsessive parents.
Please register to post and access all features of our very popular forum. It is free and quick. Over $68,000 in prizes has already been given out to active posters on our forum. Additional giveaways are planned.
Detailed information about all U.S. cities, counties, and zip codes on our site: City-data.com.