Professional Documents
Culture Documents
Hikvision Product Security White Paper
Hikvision Product Security White Paper
Hikvision Product Security White Paper
II
III
IV
:
operation
System vulnerability
Layer
Data leakage
Expired component
Client NVR Configuration
Integrated platform Unauthorized update vulnerability
Transport
Cyberattack
Switch
Perception
Physical Unauthorized
Data leakage
attack access
Layer
1
2
3
4
5
1 Due to different hardware or software versions, some functions may be different. If there is
inconsistency of the function between the actual product and the one in the guide, the actual
6
7
8
9
10
11
12
13
14
Router
Convergent
Device point
Log server
Router Convergent
Device point
15
16
17
18
19
20
21
22
23