But IT expert Derick Burton has warned about the potential exposures that this brings with it.
Citing a parallel and often precarious situation with SCADA systems (the IT systems that control critical operational processes) he advised that IT networks carrying security systems should be separated from those which provide general IT services, especially Internet connectivity.
One risk, highlighted by David Cresswell is that of security guards who might be tempted to use the Internet to access webmail
Another risk is that of the "drive-by download" – by simply landing on certain web pages the computer becomes infected automatically. It is estimated that as many as 1 in 100 web pages may be infected. A third risk is that of opening email MS Word attachments such as those asking users to fill in a form for a job search. Some of these activate malware which allows other Internet users to hack directly into the host’s hard drive and steal data. Thus, theoretically system compromise by social engineering of an IT system managing a CCTV network could allow your confidential CCTV images to be viewed from anywhere on the planet without your knowledge.
The solution to this is NEVER to allow Internet access or email on those systems which manage physical security technology unless you have a very IT-savvy and completely trustworthy security operator, who is kept fully up-to-date with the dangers of IT-based malware and social engineering.
For more details on the Specifying Security Technology Course click here. To register your interest for the next course, or to obtain a detailed product sheet, contact Janet.