You are on page 1of 28

I

II
III
IV

Security Threats in the IoT


Device management Unauthorized
Application

operation
System vulnerability
Layer

Data leakage
Expired component
Client NVR Configuration
Integrated platform Unauthorized update vulnerability
Transport

Data leakage Data tampering


Layer

Cyberattack
Switch
Perception

Physical Unauthorized
Data leakage
attack access
Layer

Unauthorized Malicious Expired


Dome IPC Access controller update software component

1

2

3

4

5
1 Due to different hardware or software versions, some functions may be different. If there is

inconsistency of the function between the actual product and the one in the guide, the actual

product shall govern.

6
7
8
9

10

11

12

13

14
Router
Convergent
Device point

Log server

Router Convergent
Device point

15

16

17

18

19

20
21
22
23

You might also like