•
Design and enhance security countermeasures to prevent leakage of information such as image data, authentication information (user name and password), alarm information, etc. Perform the countermeasure such as access restriction (using the user authentication) or access encryption (using the HTTPS function).