Cyber Security Reference Guide
Cyber Security Reference Guide
September 2018
Table of contents
PART ONE - TERMINOLOGY 3
1. Definition of Cybersecurity 3
2. Terminology map 3
3. Risk 3
4. Assets and resources 4
5. Threat 5
6. Vulnerability 5
7. Security controls 6
8. Policy 6
9. Other common terminologies 6
PART TWO - CONCEPTS 7
10. Threat modeling 7
11. Common adversaries 7
12. Common organization types 8
13. Risk assessment 9
14. Asset assessment 9
15. Policies and processes 10
16. Common risk reduction controls 10
17. Network encryption 11
18. IEEE 802.1X Network Access Control 12
This document describes common cybersecurity terms and concepts. It is intended to serve as a reference
for all cybersecurity related documents and literature produced by Axis Communications. The purpose
of this is to provide individuals and organizations that want to understand the fundamentals of
cybersecurity, with a focus on physical security systems. The content is based on simplified descriptions,
models and structures.
2. Terminology map
This terminology map shows the relationships of specific cybersecurity key terms that are discussed in
this document.
exploits
Threat Vulnerability
in
ex
se
cr
s
po
ea
ea
ce
se
cr
se
fa
in
s
s
te
flu
tr
ca
od
e
di
nc
uc
in
es
es
3. Risk
Cybersecurity is about managing risks over a longer period of time. While risks can be mitigated, it is
very rare that they can be completely eliminated. Sometimes people confuse the terms: risk, threat,
vulnerability, negative impact or asset.
RFC 2828 Internet Security Glossary defines risk as an expectation of loss expressed as the probability
that a particular threat will exploit a particular vulnerability with a particular harmful result.
This formula is used to prioritize risks. The RFC definition includes the term “particular” for threat,
vulnerability and harmful result. Each threat should be looked at individually, starting with the one that
is most plausible and having the highest negative impact.
3
A challenge when discussing risk is the probability factor. Things may happen or they may not. The
probability of an adversary exploiting a vulnerability is often determined by a how easy the vulnerability
is to exploit (exposure) and the potential benefit for the adversary to exploit it.
It is possible to plot risks with these two dimensions: use the probability that a risk will occur as one axis
and the impact of the risk, if it occurs, on the other lets. This gives a clear view of the potential impact
and priority that you need to give to each risk.
High
Hi
gh
ris
M
k
ed
Probability
iu
m
-l
ev
el
Lo
r
w
isk
-l
ev
el
ris
k
Low
Low High
Negative impact
Applying protection measures will increase the attack cost and thus reduce the probability. The attack
cost relates to how much time, resources, skill and sophistication are needed for the attack to be
successful. The risk of getting caught or other negative consequences is also part of the attack cost.
These areas are also referred to as the CIA triad. While those working with Operation Technology (OT)
will often prioritize availability, their Information Technology (IT) colleagues will often prioritize
confidentiality. Finding the right balance between these two is often challenging.
Assets and resources need to be classified in order to determine adequate protection levels. Not all data
assets and computer resources are equal in terms of the negative impact. But they are often classified
as follows:
>> Public: the asset is targeting a public consumer. Or, the negative impact is limited if disclosed to
the public.
>> Private: the asset is privileged to a specific/selected group. Typically, the negative impact is
limited to within a specific organization such as company or family.
Estimating the potential negative impact on each asset types is complex. In many cases the estimations
are subjective and the impact analysis is often underestimated. Using the ISO 27000 impact model and
designation types — i.e. Limited, Serious, Severe or Catastrophic — can help you get a quick overview to
help you prioritize. It provides a simple way to establish a more exacting value to base the estimation on
the amount of time it would take to recover from a negative impact, namely:
5. Threat
A threat can be defined as anything that can compromise or cause harm to your assets or resource. In
general, people tend to associate cyber threats with malicious hackers and malware. In reality, negative
impact often occurs due to accidents, unintentionally misuse or hardware failure.
IBM’s 2014 Cyber security Intelligence Index concluded that more than 95% of all successful breaches
could be attributed to three factors:
These factors typically result from of a lack of adequate policies, undefined responsibilities and limited
organizational awareness.
6. Vulnerability
Vulnerabilities provide opportunities for adversaries to attack or gain access to a system. They can result
from flaws, features or human errors. Malicious attackers may look to exploit any known vulnerabilities,
often combining one or more.
You need to consider both probability and potential negative impact in order to determine the risk of a
vulnerability. The risk of vulnerability may be classified low if there is a low probability and/or have
limited negative impact.
Example: The risk of a vulnerability in a web server may be classified as severe on a public web server for
an enterprise business portal. The risk of the same vulnerability may be classified as limited for a camera
deployed on a local protected network due to the reduced exposure.
A device Application Programming Interface (API) and software services may have flaws that can be
exploited in an attack. No vendor can ever guarantee that products have no flaws. If the flaws are
known, the risks may be mitigated though compensating security control measures. If an attacker
discovers unknown flaws, on the other hand, zero-day exploits may occur, not giving the victim any time
to protect the system.
In cybersecurity, the Common Vulnerability Scoring System (CVSS) is one way to classify severity of a
software vulnerability. It’s a formula that looks at how easy it is to exploit and what the negative impact
may be. The score is a value between 0-10, with 10 representing the greatest severity. You will often find
CVSS number in published Common Vulnerability and Exposure (CVE) reports.
5
Axis uses CVSS as one of the measures to determine how critical an identified vulnerability in the
software/product may be.
7. Security controls
Security controls are safeguards or countermeasures employed to avoid, detect, counteract, or minimize
security risks to physical property, information, computer systems or other assets. The processes of
deploying security controls is often referred to as hardening.
Compensating security controls are alternative safeguards that can be used when it may not be possible to
apply the preferred security control or when the preferred control may be too costly.
Security controls need to be continuously monitored and updated as threats, value, vulnerabilities and
exposure changes over time. This requires defining and following policies and processes.
8. Policy
It is important to define clear policies and processes in order to achieve adequate risk reduction over the
long term. A recommended approach is to work according to a well-defined IT protection standard, such
as ISO 27001, NIST or similar. While this task may be overwhelming for smaller organizations, having
even minimal policy and process documentation is far better than having nothing at all.
6
Exposure also plays a role in determining the risk of a vulnerability. How easy is it for an attacker to
exploit the vulnerability? This depends on the infrastructure, service exposure and daily operation.
Example: The risk of a vulnerability may be classified as severe on a public web server serving an
enterprise business portal. The same vulnerability could be classified as limited when used in cameras on
a local protected network.
The majority of cyber attacks today are opportunistic: attacks that occur just because there is a window
of opportunity. In many cases, an external opportunistic attacker does not even know who the victim is.
These attackers will use low-cost attack vectors such as:
Opportunistic attackers will normally not have the determination to spend time and resources on a
failed attack; they quickly move along to their next attempt. Applying a standard level of protection will
mitigate most risks related to opportunistic attacks.
It is harder to protect against targeted attacks, those attackers who target a specific system with a
specific goal. Targeted attacks use the same low-cost attack vectors as opportunistic attackers. However,
if the initial attacks fail, they are more determined and are willing to spend time and resources to use
more sophisticated methods to achieve their goals. For them, it is largely about how much value is at
stake.
Target attackers will often start with social engineering and spear phishing (a well-crafted email
targeting a specific recipient) to gain access to the system. If those tactics fail and the value of a
successful attack remains high, these attackers often further analyze the system, software or processes
to find alternative exploitable vulnerabilities.
7
The range of various types of actors typically includes the following:
>> Near and dear: people who may want to pry into your personal life
>> Employees: or people who have legitimately accessed the system, either by accident or deliberate
misuse
>> Pranksters: people who find interfering with computer systems an enjoyable challenge
>> Hacktivists: people who wish to attack organizations for political or ideological motives
>> Cybercriminals: people interested in making money through fraud or from the sale of valuable
information
>> Industrial competitors: entities interested in gaining an economic advantage for their companies
or organizations
>> Cyber terrorists: people or entities that carry out an attack designed to cause alarm or panic,
often for ideological or political reasons
>> Nation states: foreign intelligence service agents acting to either gain economic and political
mileage or to inflict damage to critical information systems
>> Individuals: a specific person or group acting on their own where motivation may differ from the
ones listed above. This could be an investigating journalist, white hat hacker or similar. White hat
hackers (aka ethical hackers) may pose a threat if you rather spend your resources on hiding your
flaws and vulnerabilities than fixing them.
A video system may be exploited to pry on other individuals or pranksters posting video clips on social
media. These organizations will often want to view video of their family, house and business from a
remote location over the Internet. Internet-exposed devices add risk if not implemented with additional
security controls.
Implementing any type of protection or security control measure results in incurring some type of cost.
All organizations have limited fiscal resources. If you do not know what the risks are it is very hard to
estimate the budget for your protection. You will always need to accept risks but that decision needs to
be a deliberate risk-based decision.
Some examples of assets and resources that can be protected in a camera are:
>> Video
>> Operating system
>> Network connectivity
>> Passwords
>> Interfaces
>> Device configuration
Each of these assets and resources need to be classified. It is important to understand how critical a role
each of these elements has to the security of the system and what negative impact may occur if an
element is compromised.
9
15. Policies and processes
Hardening the system during deployment is a good start. Maintaining a limited risk level throughout the
life-cycle of the system requires policies and process.
It is important to define clear policies and processes that govern usage and privileges in order to achieve
adequate risk reduction for the system over the long term. A recommended approach is to work according
to a well-defined IT protection standard, such as ISO 27001, NIST or similar. While this task may be
overwhelming for smaller organizations, having even minimal policy and process documentation is far
better than having nothing at all. This could include simple things like defining:
Managing devices should have multiple accounts (role-based) and temporary accounts should be created
for occasional maintenance/troubleshooting. AXIS Device Manager helps you easily and efficiently
manage multiple accounts and passwords for AXIS Devices. AXIS Devices belong to three different
privileges levels: viewer, operator and administrator.
Axis development teams, process and dedicated personnel aim to reduce the risk of critical vulnerabilities
in products, applications and services. Axis vulnerability management processes also includes patching
and announcement of identified vulnerabilities.
Running devices with up-to-date firmware versions will mitigate common risks for devices. That is
because latest firmware versions will include patches for known vulnerabilities that attackers may try to
exploit. AXIS Device Manager shows you if new firmware versions are available to AXIS Devices
connected to your network and efficiently deploy firmware upgrades.
10
16.4 Limit Internet exposure (Internet-facing)
Exposing computers or devices for public Internet access is risky. Internet-facing means that the device
IP address (or port) is accessible by clients on the Internet. Any camera or other network device that is
placed behind a firewall is not Internet-facing but is still able to access services on Internet, just like a
computer.
The sheer volume of malicious computers on the Internet that continuously probe public IP addresses to
find known, exploitable vulnerabilities is enormous. They get help from web-crawler search engines like
www.shodan.io to find potential victims. Shodan probes every public IP address and provides a database
of which devices or services are available on Internet. This means that all external IP addresses will
eventually be indexed and the service/interface behind the address will be identified.
The most common mistake made by a small organization is to expose a camera as a public web server.
These organizations will often want to view video from their business, house or store over the Internet.
A common, insecure solution is to configure the router to port-forward in order to forward external
requests to the camera (poking a hole in the firewall). Risk increase when an Internet-facing device is
combined with a weak (or default) passwords. This combination is what hacker groups will exploit when
building botnets such as Mirai.
Axis recommends small organizations to use Axis Companion for secure remote video access. Larger
organizations that require remote video should use some proxy solution that does not expose the
camera, just the video service. A recommendation is to always consult with your Video Management
System (VMS) vendor or IT security specialist.
11
Network encryption does not necessarily increase the protection for the camera, VMS or clients. Rather,
it protects communication between the client, VMS and the camera. It does this by preventing
information from being extracted by network traffic sniffing and by preventing data being altered during
transfer.
Axis cameras support Hyper Text Transfer Protocol Secure (HTTPS. i.e. HTTP over a secure SSL/TLS
tunnel) which provides network encryption. The client also needs to support HTTPS. HTTPS will encrypt
all administrative traffic (normal HTTP traffic) but not video as this is transferred over RTP/RTSP (Real-
Time Protocol/Real-Time Streaming Protocol). Encrypting video requires that the VMS also supports
requesting RTP tunneled over HTTPS. A recommendation is to always consult with your VMS vendor as
not all systems supports. Before HTTPS can be established the camera needs to have a certificate (self-
signed or CA-signed) and HTTPS policy needs to be set. Axis products comes with self-signed certificates
enabling HTTPS out-of-the-box.
A Certificate Authority (CA) is a service that issues (sign) server certificates and needs to be installed in
cameras. The VMS uses the certificate to validate the identity of the camera.
A publicly trusted CA such as Comodo and Symantec is typically used for public services, such as public
web and email servers. Public trusted CA root certificates are pre-installed on clients, such as Windows,
Linux, Mac and mobile devices.
A private CA is a trust point for private network services and issues certificates for private servers. The
private CA root certificate needs to be installed in clients that need to validate the signed certificates in
cameras. To meet demands for end-to-end encryption, the VMS also needs to have a server certificate
so that video clients can validate it is accessing a legitimate VMS.
AXIS Device Manager has a built-in CA service that can cost-efficiently issue and deploy server
certificates to the cameras.
12
Axis devices only support 802.1X EAP-TLS with certificates. When using client certificates, there must
be a CA (private or public) that can issue the client certificates. AXIS Device Manager enables you to
efficiently manage certificates by:
13
72193/EN/R1/1809
About Axis Communications
Axis enables a smarter and safer world by creating network solutions that provide insights for
improving security and new ways of doing business. As the industry leader in network video, Axis
offers products and services for video surveillance and analytics, access control, and audio
systems. Axis has more than 3,000 dedicated employees in over 50 countries and collaborates
with partners worldwide to deliver customer solutions. Founded in 1984, Axis is a Sweden-based
company listed on the NASDAQ Stockholm under the ticker AXIS.
For more information about Axis, please visit our website www.axis.com.
©2018 Axis Communications AB. AXIS COMMUNICATIONS, AXIS, ETRAX, ARTPEC and VAPIX are registered
trademarks or trademark applications of Axis AB in various jurisdictions. All other company names and products
are trademarks or registered trademarks of their respective companies. We reserve the right to introduce
modifications without notice.