Ann, a Physical Security Manager, is ready to replace all 50 analog surveillance cameras with IP
cameras with built-in web management. Ann has several security guard desks on different
networks that must be able to view the cameras without unauthorized people viewing the video as
well. The selected IP camera vendor does not have the ability to authenticate users at the camera
level. Which of the following should Ann suggest to BEST secure this environment?
A.
Create an IP camera network and deploy NIPS to prevent unauthorized access.
B.
Create an IP camera network and only allow SSL access to the cameras.
C.
Create an IP camera network and deploy a proxy to authenticate users prior to accessing the
cameras.
D.
Create an IP camera network and restrict access to cameras from a single management host.