Could your Building Catch a Virus? Measuring the Impact of Cyber Security Threats on Building Management Systems

نویسنده

  • K. Karagiannis
چکیده

The close control of building services is seen as essential component for delivering low energy performance. This inevitably means some form of supervisory control and data acquisition (SCADA) system. To increase the penetration of this technology into the market place, it is inevitable that internet communication will be employed increasingly in the future. However, it can be very challenging to ensure that a widely dispersed monitoring network is secure from cyber attacks. Tools are readily available on the Web that can challenge the Building management Systems (BMS), especially if they are not configured carefully. The nature of these threats is explained. Results are reported using the search engine Shodan. This search engine was able to find the IP address of a controller several thousand miles away through the internet that had been purposefully misconfigured. It is concluded that ensuring a secure system will be a critical component of commissioning any new advanced Building Energy Management system. Without this step the application of intelligent building technology designed to meet challenging energy performance will be limited to low profile projects. In the near future, when BMSs will be integrated into the Smart Grid, poor cyber security of building management systems will pose a threat not only to the building itself, but to a country’s infrastructure as well.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On Management Matters: Why We Must Improve Public Health Management Through Action; Comment on “Management Matters: A Leverage Point for Health Systems Strengthening in Global Health”

Public health management is a pillar of public health practice. Only through effective management can research, theory, and scientific innovation be translated into successful public health action. With this in mind, the U.S. Centers for Disease Control and Prevention (CDC) has developed an innovative program called Improving Public Health Management for Action (IMPACT) which aims to address th...

متن کامل

Building a Persian Gulf Missile Defense Shield and its Impact on Regional Security: (2001-2017)

The gradual development of the US missile defense shield from Europe to the Persian Gulf region over the past decade and the deployment of radar components and defenses of this project, both in the Persian Gulf region and in its floating zone, have plenty implications for regional and international systems and has aggravated the fragile security of the Persian Gulf region. Some issues such as t...

متن کامل

Security of Future Smart Homes . Cyber - Physical Threats Identification Perspectives

The paper is discussing security threats identification perspectives in modern smart homes modeled as cyber-physical systems that encompass technologies, human factors, their activities and specifics. Generally, the modeling process is performed with the help of Entity-Relationship representation, combined with experts’ knowledge in an own ad-hoc software environment. The obtained results give ...

متن کامل

Cyber Threats Foresight Against Iran Based on Attack Vector

Cyber ​​threats have been extraordinary increased in recent years. Cyber ​​attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...

متن کامل

Designing a Cyber Attack Information System for National Situational Awareness

Information and communication technology (ICT) systems underpin many of today’s societal functions and economic development. Consequently, protecting a nation’s ICT infrastructure from deliberate cyber attacks and unintentional disruptions is of paramount importance. Collaboration among all parties across all domains of cyberspace is the key to effective and coordinated effort to cope with cybe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015