Browse > Article
http://dx.doi.org/10.22156/CS4SMB.2018.8.6.129

The Analysis of CCTV Hacking and Security Countermeasure Technologies: Survey  

Hong, Sunghyuck (Div. of Information and Communication, Baekseok University)
Jeong, Sae-Young (Div. of Civil-Engineering Education, Chungnam National University)
Publication Information
Journal of Convergence for Information Technology / v.8, no.6, 2018 , pp. 129-134 More about this Journal
Abstract
This is about the CCTV hacking which is one of the recently emerging privacy-spilling crime. Recently, the usage of CCTV is being increased, and Black Hat Hackers spill the individual's privacy by hacking it. However, That crime is being increased. However, most users rarely fulfill the security management, and the government's measures are insufficient. Therfore, this research report implies some security technologies including user authentication protocols such as SSH Tunneling and Media Encryption Algorithm. and recently developed technologies including Wookyeong Information Technology's SecuWatcher for CCTV, Norma's CCTV Care App, and MarkAny's Password SAFERTM for CCTV.
Keywords
Privacy-spilling Crime; CCTV Hacking; User Authentication Protocol; SSH tunneling; Media Encryption Algorithm;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 M. C. Yim. (2018. 10. 10.). Congressman Seong-Jung Park says "Most of the CCTV Hacking is Defenseless state". ZDNetKorea. .http://www.zdnet.co.kr/news/news_view.asp?artice_id=20181010140028&type=det&re=zdk
2 Y. S. Go. (2016. 2.). Study of Security vulnerability IOT device IP exposure threat prevention system.. Bukyeong National University, Busan.
3 S. Hong. (2017). Research on IoT International Strategic Standard Model. Journal of the Korea Convergence Society, 8(2), 21-26. DOI : 10.15207/jkcs.2017.8.2.021   DOI
4 G. W. Lee. (2012). A Study on Public Institutions CCTV Information Security Management System. Dankook University, Yongin.
5 S. Hong. (2014). Analysis of DDoS Attack and Countermeasure: Survey. The Journal of Digital Policy and Management, 12(1), 423-429. DOI : 10.14400/jdpm.2014.12.1.423   DOI
6 S. Hong. (2013). Disconnection of Wireless LAN Attack and Countermeasure. The Journal of Digital Policy and Management, 11(12), 453-458. DOI : 10.14400/jdpm.2013.11.12.453   DOI
7 J. Y. Byeon. (2017). 'IP camera' hacked 'clumsy'... Clear outflow immediately. Sanup News. http://www.kidd.co.kr/news/199010
8 K. T. Lee. (2018. 8. 22). Chinese CCTV Hackes Korean Privacy. Digital Times. http://www.dt.co.kr/contents.html?article_no=2018082302100351041002&ref
9 B. S. Jeon & H. C. Yang. (2018). Chinese CCTV hacking is defenseless. MBN News. http://www.mbn.co.kr/pages/vod/programView.mbn?bcastSeqNo=1194180
10 T. S. Park. (2011). Design and Implementation User Authentication Protocol to Prevent Malicious User in IP CCTV Enviornment. Sungsil University, Seoul.
11 G. J. Hwang, J. P. Park & S. M. Yang. (2016). Security Technique using SSH Tunneling for CCTV Remote Access. Sungsil University, Seoul.
12 S. C. Hwang. (2012). Development of Media Crypto Algorithm for anti-hacking into CCTV. Indeok University, Seoul.
13 N. I. Heo. (2017). CCTV Video Hacking Protection Solution "SECUWATCHER". Money Today. http://news.mt.co.kr/mtview.php?no=2017121109240835573
14 N. I. Heo. (2018). Norma released CCTV Security App "CCTV Care". ETNews. http://www.etnews.com/20180717000198