{"id":6263,"date":"2019-09-29T20:43:42","date_gmt":"2019-09-30T00:43:42","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/?p=6263"},"modified":"2019-09-29T20:43:42","modified_gmt":"2019-09-30T00:43:42","slug":"banks-confront-the-insecurity-of-physical-security","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/2019\/09\/29\/banks-confront-the-insecurity-of-physical-security\/","title":{"rendered":"Banks confront the insecurity of physical security"},"content":{"rendered":"<p>This article describes some of the vulnerabilities that exist because of IoT security devices that are not being managed properly. For example, the \u201cDevil\u2019s Ivy\u201d vulnerability allowed an attacker to remotely access a video feed from IP cameras, or block another user\u2019s access to the feed. The article mostly focused on physical security systems that banks implement, but the main concept is that devices that are supposed to assist in physical security, can also be an entry point to the organization. These devices need to be patched, hardened and replaced on some sort of cycle.<\/p>\n<p>https:\/\/www.securityinfowatch.com\/video-surveillance\/article\/21107167\/banks-confront-the-insecurity-of-physical-security<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article describes some of the vulnerabilities that exist because of IoT security devices that are not being managed properly. For example, the \u201cDevil\u2019s Ivy\u201d vulnerability allowed an attacker to remotely access a video feed from IP cameras, or block another user\u2019s access to the feed. The article mostly focused on physical security systems that [&hellip;]<\/p>\n","protected":false},"author":20468,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[799101],"tags":[],"class_list":{"0":"post-6263","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-05-system-and-user-enumeration","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/posts\/6263","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/users\/20468"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/comments?post=6263"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/posts\/6263\/revisions"}],"predecessor-version":[{"id":6264,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/posts\/6263\/revisions\/6264"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/media?parent=6263"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/categories?post=6263"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/tags?post=6263"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}