Bosch Camera Data Security Training
Bosch Camera Data Security Training
In this online course you will learn how to secure your camera system and the basic
about certification usage.
Certificates
EXAM
Exam
R ESOUR CES
QUESTION B AN KS
Data security refers to protective digital privacy measures that are applied to prevent
unauthorized access to computers, databases and websites.
Intentional malicious attacks become more feasible and more likely due to more connectivity.
Securing video surveillance data is just as important as safeguarding people and property.
Providing secure and reliable products and services to customers is the objective of Bosch.
Terminology
Vulnerabilities - are flaws in a computer system that weaken the overall security
of the device/system. Vulnerabilities can be exploited by a threat actor, such as
an attacker, to cross privilege boundaries (i.e. perform unauthorized actions)
within a computer system.
used to perform Distributed Denial-of-Service (DDoS) attacks, steal data, send spam,
and allow the attacker to access the device and its connection.
Since more than 90% of IP cameras on the market run Linux kernels, they are
susceptible to weaponization. Weaponizing an IP camera is when it's "turned" into a
bot, part of a botnet, controlled remotely by an entity to do actions the device was
not designed for, like a DDoS attack). An IP camera can be "turned" into a bot by
maliciously gaining access, changing the behavior of the device.
DDoS a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to
make a machine or network resource unavailable to its intended users by temporarily or
indefinitely disrupting services of a host connected to a network. Denial of service is typically
On October 21, 2016, three consecutive DDoS attacks were launched against the Domain
Name System (DNS) provider Dyn. The activities are believed to have been executed through a
residential gateways and baby monitors—that had been infected with the Mirai malware.
Data Theft: If the camera stores recordings or images locally or in the cloud, a
breach could lead to the theft of this data, exposing sensitive information or
footage to malicious actors.
Legal and Compliance Issues: Breaches involving sensitive data could lead to
Remote Control: If attackers gain control over the camera, they could pivot to
control other devices on the network, expanding the scope of the security
breach.
1. Weak and Stolen Credentials, a.k.a. Passwords (Example of week passwords: admin,
1234, safe, test)
2. Social Engineering (Example: Sharing your password with other people, or mentioning in
a conversation for example that your password is the name of your pet animal)
1. Back Doors, Application Vulnerabilities: There are certain threat actors that can influence
the creation of a backdoor into a device with the purpose of control or for surveillance
and espionage.
4. Improper Configuration and User Error : A security misconfiguration occurs when system
or application configuration settings are missing or are erroneously implemented,
allowing unauthorized access
infrastructure (2016)
Vendor B’s vulnerability allowing authentication bypass, i.e., seizing Admin rights
without providing valid credentials (2021)
Vendor C’s backdoor exploit affects 400K internet connected devices (2022)
Some DoD’s banned Vendor C and Vendor B cameras from use in own premises
(2023)
UL2900-2-3
IEC62443-4-1
IoT SMM
C l i c k h e r e fo r d e t a i l e d i n fo r m a t i o n
1. Secure Element
All CPP14 devices incorporate a new secure crypto-micro controller, which we call our Secure
Element.
“A Secure Element is a tamper-resistant platform capable of securely hosting applications and their
confidential and cryptographic data (for example cryptographic keys) in accordance with the rules
and security requirements set by well-identified trusted authorities.”
In this specific case the requirements are defined in the Trusted Platform Module library
specification defined by the Trusted Computing Group (TCG). As the Secure Element supports
the main functionalities specified by TCG, the ones needed for an IoT device, it is often
referred to as a “TPM”. Due to security reasons, the firmware or functionality of the secure
crypto-microcontroller cannot be altered in the field. Thus, not all new security features
become available on devices with older secure crypto-micro controller hardware or firmware
revisions.
For more information on TPM, click here.
For more information on CPP 14, click here.
For more information on standards of Secure Element, click here.
The Crypto Co-Processor is responsible for storing private keys, encryption functions (Triple
DES and AES 256), cryptographic functions such as generating Hashes, and PKI functions such
as certificate validation. Any critical information placed inside the TPM, such as private keys,
cannot be extracted
S E CURE E L E M E N T H ARD E N E D CRY P T O S E CURE E L E M E N T :
E AL : E V AL UAT IO N
T P M CRY P T O CO - CO - P RO CE S S O R CP P 1 3 AN D 1 4
AS S URAN CE L E V E L
P RO CE S S O R? (2 0 0 4 ) D E V ICE S
Independently certified with Assurance Level (EAL) 6+ based on Common Criteria for
Information Technology Security Evaluation
Cryptography with up to 4096-bit RSA keys for up to TLS1.3 and device identity
DES/AES/PKI crypto-coprocessors
S E CURE E L E M E N T H ARD E N E D CRY P T O S E CURE E L E M E N T :
E AL : E V AL UAT IO N
T P M CRY P T O CO - CO - P RO CE S S O R CP P 1 3 AN D 1 4
AS S URAN CE L E V E L
P RO CE S S O R? (2 0 0 4 ) D E V ICE S
EAL is a numerical grade assigned following the completion of a Common Criteria Security
Evaluation
User Authentication
Bosch IP cameras support different methods of authentication.
Pre-configured is password-based authentication with three different roles that can be assigned
to a user.
Optional certificate-based authentication or ADFS integration into an active directory is
supported.
Password Policy
No default passwords are set for the camera, when first connecting to the device a new
TLS 1.0 and 1.1 are the standard advanced developments of SSL 3.0 (Secure Sockets
Layer; an outdated encryption protocol for data transmission in IP-based networks).
Modern devices use TLS 1.2 or 1.3
All Bosch IP video devices utilize Remote Control Protocol Plus (RCP+) for detection,
control, and communications. RCP+ is a proprietary Bosch protocol which uses
specific static ports to detect and communicate with Bosch IP video devices - 1756,
1757, and 1758. When working with a video management system that has integrated
Bosch IP video devices via the Bosch VideoSDK, the listed ports must be accessible
on the network for the IP video devices to function correctly. Video can be streamed
from the devices in several ways: UDP (Dynamic), HTTP (80), or HTTPS (443).
TLS, all HTTPS control communications and video payload is encrypted via the
encryption engine in the device.
5. Simple Certificate
Enrollment Protocol
(SCEP)
Bosch IP cameras provide various ways to have their certificates installed and
maintained.
One way is to use a standard protocol also used in PKI environments, like SCEP
internal, trustworthy networks by allowing the device to fetch the certificate itself.
To ensure that this is not misused, an authorized person must first create a "one-time
password", which is then made available to the device.
The end device can then request a certificate from the SCEP service using this
temporary password, which on Windows typically expires after 60 minutes.
Each SCEP request is identified by a transmission identifier that is generated by the
client and uniquely identifies the request.
To ensure that this is not misused, an authorized person must first create a "one-time
password", which is then made available to the device. The end device can then
request a certificate from the SCEP service using this temporary password, which on
Windows typically expires after 60 minutes. Each SCEP request is identified by a
transmission identifier that is generated by the client and uniquely identifies the
request.
Bosch_CertificateManagement_TechNote.pdf
832.5 KB
6. Software sealing
After a completed configuration of an IP camera, the settings of the device should not
change. A software seal can be enabled to notify of device configuration changes.
Recommendation: Enable software sealing if there are no pending configuration
changes.
7. Encrypted firmware
All cameras can be integrated with the Bosch Cloud Solution (Remote Portal) to allow central
configuration and management of devices via the cloud.
The device should be always updated to the latest firmware version to include security or
functional fixes.
For devices connected to the Remote Portal (Cloud) users are notified about availability of
latest firmware.
9. Session timeout
1. One is the RCP session, which times out after 30 seconds of inactivity
2. Another is the browser session timeout.
HTTP requests are static, one request is sent and responded to.
The browser session timeout defines the period after which a browser user
needs to re-authenticate.
Session timeouts are valid regardless of the client. If a session times out, re-
authentication is needed.
Enabling "HSTS" in the network access menu prevents - TLS downgrade attacks
The Discovery port is for Onvif, you can turn this one off - > and then the discovery
will be on the RCP+ port.
HSTS: ON
UDPencryption capable
Maybe the best kept secret in the industry is how long Bosch has been
focused on cyber security.
Some features that we will discuss today have been in place since 2004.
This includes:
Certificates
Devices can only be written to via a valid “signed” firmware upload, which is specific
S E CURIT Y FO R IN D US T RIAL
UL 2 9 0 0 CY B E RS E CURIT Y IO T S E CURIT Y M AT URIT Y
AUT O M AT IO N AN D CO N T RO L
CE RT IFICAT IO N M O D E L CE RT IFICAT IO N
S YS TE M S
As a result of sustained efforts, Bosch cameras have achieved Underwriters Laboratories (UL)
2900-2-3 Level 2 cybersecurity certification. This certification confirms that Bosch performs the
necessary penetration testing on the products to probe for vulnerabilities and have appropriate
methods to manage cybersecurity efficiently.
“Certification to the UL 2900 Series of Standards is the highest recognition of cybersecurity due
diligence and helps demonstrate that a product is secure to modern standards." - UL Cybersecurity
Assurance Program (UL CAP)
S E CURIT Y FO R IN D US T RIAL
UL 2 9 0 0 CY B E RS E CURIT Y IO T S E CURIT Y M AT URIT Y
AUT O M AT IO N AN D CO N T RO L
CE RT IFICAT IO N M O D E L CE RT IFICAT IO N
S YS TE M S
Bosch cameras have achieved the IEC 62443-4-1 Certificate of Conformity – Industrial Cyber
Security Capability.
This certificate focuses on the processes and definitions around developing and manufacturing
secure products.
Requirements assessed:
Security management, security requirements, secure by design, secure implementation,
security verification and validation testing, management of security-related issues, security
update management, security guidelines.
S E CURIT Y FO R IN D US T RIAL
UL 2 9 0 0 CY B E RS E CURIT Y IO T S E CURIT Y M AT URIT Y
AUT O M AT IO N AN D CO N T RO L
CE RT IFICAT IO N M O D E L CE RT IFICAT IO N
S YS TE M S
Bosch has attained the IoT Security Maturity Model (SMM) certification from the Industry IoT
Consortium (IIC), confirming that we perform the necessary penetration testing and internal
practices to address cybersecurity.
Lesson 3 of 8
In the upcoming chapter, we will delve into the initial security configuration of a
camera, exploring the vital aspects of implementing robust password protection
mechanisms.
Security concept
When dealing with Bosch IP video devices your first line of protection are the devices
themselves. Bosch encoders and cameras are manufactured in a controlled and
secure environment that is continually audited. Devices can only be written to via a
valid firmware upload, which is specific to hardware series and chipset.
Most Bosch IP video devices come with an onboard security chip that provides
functionality similar to crypto SmartCards and the so called Trusted Platform Module,
or short TPM. This chip acts like a safe for critical data, protecting certificates, keys,
licenses, etc. against unauthorized access even when the camera is physically opened
to gain access.
Bosch IP video devices have been subjected to more than thirty thousand (30 000)
vulnerability and penetration tests performed by independent security vendors. Thus
far, there have been no successful cyberattacks on a properly secured device.
All Bosch IP video devices currently If no DHCP server is available in With earlier firmware, it will assign
come in a factory default state the active network on which a itself the default IP address
ready to accept a DHCP IP device is deployed, the device will 192.168.0.1.
address. - if running firmware 6.32 or higher -
automatically apply a link-local
address out of the range of
169.254.1.0 to 169.254.254.255, or
169.254.0.0/16.
Secure configuration
One of the first steps in limiting the possibilities of Note : Even before using IP Address
internal cyberattacks on a network, executed by Management to track the usage of IP
unauthorized locally attached network devices, is to addresses, a network management best
limit available unused IP addresses. This is done by practice is to limit access to the
using IPAM (IP Address Management), in network through port security on edge
conjunction with subnetting the IP address range switches, for example only a specific
that will be used (This applies were the installer MAC address can access through a
What is a password?
Passwords are used as an authentication method for individuals to access computer
systems or applications.
Using passwords ensures the owner of the account is the only one who
has access.
Step 2: Once the camera is identified, the 1st message we get is the notification "The
Once the camera is added as exception you will need to set up the password.
Using Configuration Manager add a password to your out of the box camera. Setting
up the password can be done via the web browser as well.
All defaulted devices with Firmware 6.4 (2017) and above cannot be accessed or configured
What is Hashing?
Hashing is a function used to map data to a fixed-length value. This function is called
the hash function, and the output is called the hash value/digest.
There are two primary applications of hashing:
Password Hashes: In most website servers, it converts user passwords into a hash value
before being stored on the server. It compares the hash value re-calculated during login to the
Integrity Verification: When it uploads a file to a website, it also shared its hash as a
bundle. When a user downloads it, it can recalculate the hash and compare it to establish data
integrity.
Hashing takes arbitrary input and produce a fixed-length string that has the following attributes:
with a given key, hashing it, and then encrypting the key with
the recipient’s public key and signing the hash with the
sender’s private key.
decrypt the key with their private key, which allows them to
decrypt the message.
The SHA-2 family consists of six hash functions with digests (hash values) that are
224, 256, 384 or 512 bits
untampered unit.
In this chapter, we'll explore two crucial concepts: Vulnerability Assessment and
vulnerability scanners. We'll dive into Nessus software, breaking down how it scans
and what results it provides. We'll also talk about vulnerability reports and understand
terms like CVSS and CVE for better cybersecurity. Shifting gears, we'll discuss the
basics of hardening device access, including Camera Lock Down. This section
simplifies how to secure devices and explains when and why it's essential in cyber
security.
Vulnerability assessments
Vulnerability assessments or scanning is a testing process used to identify and rank
vulnerabilities in a device or system.
Vulnerability scans are typically performed with automated tools such as Nessus or
NMAP and depending on the network facing surface of the device and the scanning
software that you're using vulnerability scans typically only take a few seconds to a
few minutes per host.
Nessus
In the following steps we will explain how to create a new scan in Nessus.
Step 1
The main page is the My Scan page. To create a new scan click on “Create a new
scan” or “New Scan”
Step 2
Setup a scan name. Under the scan “Target” section add the IP address of the device
you want to scan.
Step 3
You can run the scan immediately by clicking on the “Launch” button or you can
“Save” the scan for a latter use.
Step 4
Already configured scans is going to appear under “My Scans” section. The scan can
be launched by pressing the arrow button.
Step 5
The scan is going to take approx 15 min. Once the scan is finished click on the scan
name for more details.
Step 6
Scanning result of a factory defaulted (not locked down) for CPP ≤7.3 camera, will
typically produce 4 vulnerabilities.
Scanning a factory defaulted (not locked down) CPP14.2 camera, with firmware ≥
9.0 will typically produce 2 vulnerabilities.
Description:
The X.509 certificate chain for this service is not signed by a recognized certificate
authority.
Description:
The server's X.509 certificate cannot be trusted. This situation can occur in three diffe
rent ways, in which the chain of trust can be broken, as stated below :
1. First, the top of the certificate chain sent by the server might not be descended
from a known public certificate authority. This can occur either when the top of
the chain is an unrecognized, self-signed certificate, or when intermediate
certificates are missing that would connect the top of the certificate chain to a
known public certificate authority.
2. Second, the certificate chain may contain a certificate that is not valid at the
time of the scan.
3. Third, the certificate chain may contain a signature that either didn't match the
certificate's information or could not be verified.
This could make it easier to carry out man-in-the-middle attacks against the remote
host.
In the following steps we will explain how to create a new scan in Nessus.
Step 1
Reports can be created quickly. From the “Home Page” select “Reports”.
Step 2
The report starts by color categorizing the type of vulnerabilities, the Nessus
identified.
Vulnerability name
Description
Solution
Risk Factor
For a system administrator or the company's IT department, the report shows the
risk factors, but also vulnerabilities names, and a solutions how to fix each one.
From a hacker with malicious intent point of view this is a document where they
look for the vulnerability or vulnerabilities that can provide access and leverage over
the system.
What is CVSS in the report?
The Common Vulnerability Scoring System (CVSS) provides a way to capture the
principal characteristics of a vulnerability and produce a numerical score reflecting its severity.
Exploit ability means that the weakness has a definite path to giving potential attackers access
to sensitive information.
Known Exploits
What is the Exploit Database (EDB)?
The Exploit Database is a public exploits archive and corresponding vulnerable software,
From an attacker point of view, knowing a weakness, all that is left is to find a way how
to exploit this vulnerability.
What is an exploit?
CVSS vs CVE
(CVSS) provides a way to capture the principal CVE is a dictionary that provides
characteristics of a vulnerability and produce a definitions for publicly disclosed
numerical score reflecting its severity. The cybersecurity vulnerabilities and
numerical score can then be translated into a exposures. CVSS is a separate program
qualitative representation (such as low, medium, from CVE. CVE’s sole purpose it to
high, and critical) to help organizations properly provide common vulnerability identifiers
assess and prioritize their vulnerability called “CVE Entries.” CVE does not
management processes. provide severity scoring or prioritization
ratings for software vulnerabilities.
For more information, Common Vulnerabilities
click here and/or here. and Exposures (CVE)
So when we
communication a
vulnerability “CVE-2016-
765432” anyone can
identify what the
vulnerability is by
referring the CVE list.
Yes: We have a successful management process in place to deal with this type of
event.
The vulnerability came into the firmware 6.32 through a feature extension, requiring
larger buffers.
It was overlooked in one section of code to check the length of the message,
allowing a buffer overflow situation.
All firmware prior to 6.32 had restricted buffer length and this length check was
not necessary. Buffer overflow was not possible by design.
For older products that run FW 5.54, FW 5.97, and FW 6.30 as maximum,
For more information on Security Advisory, download the PDF file below:
bosch-2018-1202-bt-cve-2018-
19036_security_advisory_ip_camera_vulnerability.pdf
363.7 KB
AV:N
AC:L
PR:N
UI:N
S:U
C:L
I:H
A:H
Scores
CVSS Rating The CVSS V3 Base Score is rated at: 9.4 (Critical)
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A :H
Protective measures
Now the we know what are the vulnerabilities of our device, we can define the protective
measures for them.
All Bosch IP video devices come with built-in multi-purpose web pages. The device-specific web
pages support both live and playback video functions, as well as some specific configuration
For the online training, consult resource tab for more details:
Hardening Overview
There are two levels of hardening defined, namely ’elevated’ and ‘strict’ .
Hardening level ‘strict’ features the most secure means of setting up a device but
might be limiting the usage of the device as features like auto discovery of a device
are disabled.
For each feature it should be evaluated if ‘elevated’ settings or ‘strict’ settings can be
applied.
HTTP, HTTPS and video port usage - HTTP is enabled by default, but unencrypted, so
credentials or settings are transferred unencrypted if used. HTTP and HTTPS port
usage on all devices can be altered or turned off. Encrypted communication can
be enforced by disabling RCP+ port as well as the HTTP port, forcing all
communication to use encryption.
Recommendations:
Plain HTTP should be disabled in favor of the encrypted HTTPS, especially if the
network is untrusted.
HTTPS is the default secure protocol used for configuration and should remain
enabled.
on the camera.
CPP 13 and 14.x cameras do not allow TLS versions below 1.2. They also
support the newer TLS 1.3 specification. Recommendation: Set minimum TLS
version to 1.2 if not already set.
Camera Lockdown
HSTS: ON
Disables the internal iSCSI server which is used to make internal recordings on
the camera accessible via iSCSI. iSCSI is an unencrypted protocol. Disable iSCSI
server if not used on the camera.
Ping Response - in a high secure network this can be disabled to avoid device
enumeration via ping sweep, although there are several other means of device
discovery that can be used by an attacker. Risk based approach, can be disabled
for high security networks.
ONVIF Discovery - Support the discovery of camera devices via the ONVIF
Discovery protocol.
Recommendation: When working with dynamic IP addresses and ONVIF
compliant tools this feature should remain enabled, when working in a fixed
environment with fixed IP addresses, this can be turned off.
Default rating is a B
IPv4 Filter
IP Filter
In IP Filter several IP addresses (single hosts or network subnets) can be defined,
that are allowed to access the camera. It is recommended to define the computers or
Enter a base IP address that falls within the subnet rule you create.The base IP
address specifies which subnet you are allowing and it must fall within the
desired range.
Enter a subnet mask that defines the IP addresses with which the IP video device
will accept communication.
This setting will restrict access from devices that fall within the defined IP range of
192.168.1.16 to 192.168.1.31.
Firmware sealing and software sealing
changes.
Firmware Signing - Each firmware update file is encrypted and signed by a Bosch
certificate. Only updates published by Bosch can be installed on the cameras, avoiding
Certificates
Arnaud Vanwolleghem
Welcome to this chapter, where we'll break down the basics of encryption keys and
why they matter for certificates. We'll dive into Certificate Management using
MicroCA, covering how to start MicroCA, set up Certificate Authorities, and sign
device certificates. We'll also explore Certificate Management with RCP+ and
HTTP(S), explaining CSR generation, getting CSRs signed, and figuring out how to use
certificates.
Digital Certificates
Digital Certificates are used to validate the keys you receive are authentic:
Public Keys!
Certificate Management principle - way of work
This process ensures that even if someone intercepts the communication between
the IP camera and the web server, they cannot decipher the encrypted data without
the session key. The use of public-key cryptography in the handshake phase enables
secure key exchange and establishes a secure channel for subsequent data
transmission.
This way, the HTTPS protocol ensures secure and encrypted communication between
the IP camera and the web server, protecting sensitive information from unauthorized
access or tampering.
Certificate Management using MicroCA
Bosch IP cameras provide various ways to have their certificates installed and
maintained. One way is to use the proprietary protocol RCP+ (Remote Control
Protocol plus) in combination with HTTP/S to upload and download certificates.
For highest level of security, the private key must be concealed in hardware, a
physical key store, typically performed by a Trusted Platform Module (TPM) chip.
Use a USB or smart card crypto token for MicroCA use to guarantee exclusive
ownership.
For test purposes, or in case of low expectations on measures against stolen keys,
you may also store the private key and certificate on a standard USB flash stick as
PKCS12 file.
Note :
Malware on the PC may create an unnoticed copy and crack the PIN due to weak
Preferences
On the navigation bar of the Configuration Manager program, click the Preferences tab.
USB File
Create
In the MicroCA group., click Create. The Create CA dialog box is displayed.
Security
Fill out the Organization, Organization unit, Locality, State and Country boxes. In larger installations,
this information will help you to identify the authority.
Trusted
Select trusted.
Generate certificate
To confirm creating a new certificate, click OK. A Password dialog box is displayed.
Create
In the Pfx File password box, type a new password. While you type, the Password dialog box will
change its color from red (very weak password) to yellow (weak password) and to green (very strong
password). Use a combination of characters, digits, and special characters to achieve a very strong
password.
In the Valid from and Valid until lists, click the desired start and end date.
Note : Since the MicroCA functionality has no provisions to prolong validity, make sure that you select
an appropriate period of time.
In the Common name box, enter a meaningful name for the new Certificate Authority.
no space
minimum length
In the Key type list, select an entry. (in our case RSA 2048 )
Note : Higher numbers reflect higher levels of security. For example, RSA 2048 is more secure than
RSA 1024, but requires more computation time.
Insert a USB stick into your system, click the icon to the right of the Certificate store location box,
then select a storage location.
USB File
Insert a USB stick into your system, click the icon to the right of the Certificate store location box,
then select a storage location.
For signing, you will need your MicroCA crypto token or USB drive, and you need to
enter the MicroCA PIN to authorize its use.
The new CM 7.x offers the possibility of generating a signing request that can be
signed by a Certificate Authority.
Create HTTPS CRS and sign the certificate with the new CA
Note : Creating the certificate request may take some time due to the key creation
process.
create
Click Create.
The remaining boxes are filled from the MicroCA certificate and can be adapted according to your
needs.
The sign icon is available after MicroCA has been configured.
The sign icon allows you to sign and upload the signed certificate in a single step.
You may be asked to insert your smart card or to type your PIN to authorize the
action.
Follow the instruction on the screen.
Certificates
Since firmware version 6.30 all cameras are prepared to receive a unique Bosch
certificate during production, assigned and enrolled by Escrypt LRA. These certificates
prove that every device is an original Bosch-manufactured and untampered unit.
TLS Date : Utilizes the TLS handshake with designated server to establish and
sync time.
Crypto Co-Processor
CPP 7.3 ≤
Cameras with security co-processor version 3 with an externally applied certificate
will fail HTTPS connections requesting SHA256. The restriction applies to all
functions using the private key from the certificate, including:
For the most IP cameras and encoders, you can use for this the reset button.
For the ones that do not have a reset button, use the factory default function via the
web interface before dismounting them from the network.
All users and their respective passwords will be deleted, and the settings will be set
back to the factory default settings. All certificates and the respective keys that were
stored in the TPM or secure element will also be deleted.
Other devices may have different options to set them to factory default. Refer to the
instructions in the respective user documentation for correct disposal procedures.
Lesson 7 of 8
Exam
Arnaud Vanwolleghem
Dear Learner. Congratulations you have gone through the full content of the training. A quiz follows on
the next page. You will be asked 10 questions about the content of the training. You must get 80%
correct to pass the exam. Do you think you have absorbed all the information thoroughly? Then click on
'Start Exam'.
Question
01/01
10 questions drawn randomly from Bosch Camera Data Security Training Exam
Lesson 8 of 8
Welcome to this section, where you can access whitepapers for a deeper
understanding of the related subjects. Additionally, feel free to explore our YouTube
channel, where you can tune in to Cyber Bytes—concise educational videos covering
various aspects of Cyber Security.
Whitepapers
Please click the provided links below to access in-depth whitepapers on the
associated subjects.
Bosch_CertificateManagement_TechNote.pdf
832.5 KB
Bosch_ConfigSealing_TechNote.pdf
432.1 KB
bosch_hardening_windows_2K22_en_v1.1.pdf
1.1 MB
Bosch_IP_Camera_Hardening_and_Cybersecurity_Guide_TechNote.pdf
552.5 KB
Bosch_Secure_by_default_TechNote.pdf
435.9 KB
EmbeddedLoginFirewall_TechNote.pdf
421.1 KB
IP_video_products_Cybersecurity_guidebook_enUS_99078607755.pdf
2.6 MB
Configuration_Manage_Operation_Manual_enUS_9007200472721035.pdf
2.1 MB
Bosch_Releaseletter_ConfigManager_7.71.0169.pdf
343.7 KB
Network Authentication 802.1x_TechWP.pdf
1019.4 KB
Cyber Bytes
Click the link to view the Cyber Bytes YouTube series. As part of our Cyber Bytes
series, we aim to help you gain a better understanding of the key aspects of cyber and
data security, demonstrating Bosch's end-to-end approach to security.
YOUTUBE
01/15
Self-signed certificate
02/15
What is the Bosch cameras minimum number of characters for initial password
setup?
12
Question
03/15
What is a Vulnerability?
04/15
What is a Backdoor?
05/15
Bosch leading measures to ensure data security: Which transport layer security
(TLS) version is used in Bosch devices to ensure secure communication?
06/15
07/15
08/15
09/15
10/15
11/15
12/15
13/15
14/15
15/15
Two-factor authentication