Intelligent buildings: an investigation into current and emerging security vulnerabilities in automated building systems using an applied defeat methodology
نویسندگان
چکیده
Intelligent Buildings (IB) have become increasing popular during the past decade, driven through the need to reduce energy, have more reactive and safer buildings, and increase productivity. IB integrate many systems that were in the past isolated from each other, including fire and life safety, HVAC, lighting, security, etc. Facilities contain commercial-in-confidence material and other valued assets; however, IB are integrated through open and common data communication protocols and hardware, leaving facilities exposed to external and internal threats. The study presents an investigation into IB, based on a defeat evaluation methdology. IB vulnerabilities considered two areas, namely physical and software vulnerabilties. Physical hardware vulnerabilities included physical access to the automation devices or workstations, communication networks, wiretapping, remote connectivity, foreign devices and local field programming. Software vulnerabilities included common connectivity protocols, restricted encryption and limited security considerations. These vulnerabilities could result in such attacks as denial of service, covert facilty entry or espionage. IB risks are contextual, aligned with the facility’s threat exposure; nevertheless, there are generic mitigation strategies that can be taken to protect IB systems. Protection includes situational threat driven security risk management, understanding system criticalities, integration of departments, a degree of network isolation and greater awareness.
منابع مشابه
Assessing Vulnerabilities of Biometric Readers Using an Applied Defeat Evaluation Methodology
Access control systems using biometric identification readers are becoming common within critical infrastructure and other high security applications. There is a perception that biometric, due to their ability to identify and validate the user, are more secure. However, biometric systems are vulnerable to many categories of attack vectors and there has been restricted research into such defeat ...
متن کاملIntelligent Energy Management System for Office Buildings Using Traffic Control System
Rapid advances in new sciences and technologies result in high penetration of smart devices and services in daily life. In this regard, smart buildings are one of the prominent examples which have dramatically improved not only the accuracy and efficiency of buildings but also the speed of daily routines. Recently, integration of the cutting-edge technologies has been traversing from residentia...
متن کاملContour Crafting Process Plan Optimization Part I: Single-Nozzle Case
Contour Crafting is an emerging technology that uses robotics to construct free form building structures by repeatedly laying down layers of material such as concrete. The Contour Crafting technology scales up automated additive fabrication from building small industrial parts to constructing buildings. Tool path planning and optimization for Contour Crafting benefit the technology by increasin...
متن کاملProceedings of the 2 nd Australian Security and Intelligence Conference
Biometric access control systems are becoming more common and may be considered high-security, due to their ability to identify and validate that the person is who they purport to be. Therefore, such biometric systems are often installed into critical infrastructure facilities as a means to gain high security protection. To date, there has been considerable research into the effectiveness of bi...
متن کاملINTELLIGENT BUILDING ASSESSMENT BASED ON AN INTEGRATED MODEL OF FUZZY ANALYTIC HIERARCHY PROCESS AND FUZZY PREFERENCE DEGREE APPROACH (FAHP-FPDA)
Intelligent building (IB) technologies have widespread applications in the building design and development. In this regard, it is necessary to develop intelligent building assessment models in order to satisfy the clients, professionals, and occupants' growing demands. To this end, this paper proposes an integrated analytic hierarchy process (AHP) and preference degree approach (PDA) under the ...
متن کامل