A Physical Security Manager is ready to replace all 50 analog surveillance cameras with IP
cameras with built-in web management. The Security Manager has several security guard desks
on different networks that must be able to view the cameras without unauthorized people viewing
the video as well. The selected IP camera vendor does not have the ability to authenticate users at
the camera level. Which of the following should the Security Manager suggest to BEST secure this
environment?
A.
Create an IP camera network and deploy NIPS to prevent unauthorized access.
B.
Create an IP camera network and only allow SSL access to the cameras.
C.
Create an IP camera network and deploy a proxy to authenticate users prior to accessing the
cameras.
D.
Create an IP camera network and restrict access to cameras from a single management host.