Read this paper to get best practices to reduce the cyber vulnerabilities of cameras and access control systems.