Reference Hub2
Security Threats and Risks of Intelligent Building Systems: Protecting Facilities from Current and Emerging Vulnerabilities

Security Threats and Risks of Intelligent Building Systems: Protecting Facilities from Current and Emerging Vulnerabilities

David Brooks
ISBN13: 9781466626591|ISBN10: 1466626593|EISBN13: 9781466626904
DOI: 10.4018/978-1-4666-2659-1.ch001
Cite Chapter Cite Chapter

MLA

Brooks, David. "Security Threats and Risks of Intelligent Building Systems: Protecting Facilities from Current and Emerging Vulnerabilities." Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection, edited by Christopher Laing, et al., IGI Global, 2013, pp. 1-16. https://doi.org/10.4018/978-1-4666-2659-1.ch001

APA

Brooks, D. (2013). Security Threats and Risks of Intelligent Building Systems: Protecting Facilities from Current and Emerging Vulnerabilities. In C. Laing, A. Badii, & P. Vickers (Eds.), Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection (pp. 1-16). IGI Global. https://doi.org/10.4018/978-1-4666-2659-1.ch001

Chicago

Brooks, David. "Security Threats and Risks of Intelligent Building Systems: Protecting Facilities from Current and Emerging Vulnerabilities." In Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection, edited by Christopher Laing, Atta Badii, and Paul Vickers, 1-16. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-2659-1.ch001

Export Reference

Mendeley
Favorite

Abstract

Intelligent Buildings (IB) are facility-wide systems that connect, control, and monitor the plant and equipment of a facility. The aim of IB is to ensure a facility is more efficient, productive, and safe, at a reduced cost. A typical IB integrates diverse subsystems into a common and open data communication network, using both software and hardware; however, IBs suffer from diverse generic vulnerabilities. Identified vulnerabilities may include limited awareness of security threats and system vulnerabilities, physical access to parts of the system, compromise of various networks, insertion of foreign devices, lack of physical security, and reliance on utility power. IB risks are contextual and aligned with the threat exposure of the facility. Nevertheless, there are generic mitigation strategies that can be put in place to protect IB systems. Strategies include threat-driven security risk management, an understanding of system criticality, greater integration of departments, network isolation, layered protection measures, and increased security awareness.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.