Infrastructure and cyber attacks
Kim Van Rooyen and Nathan Jones, both experts from Turner & Townsend, give their thoughts on cyber security in the built environment.
Contents |
[edit] What types of cyber attacks are there?
Cyber attacks come in many different forms. Nowadays, when people think of cyber attacks they think large-scale – a group of hackers working on behalf of governments trying to find out state secrets for example. However, cyber attacks can come from anywhere – teenagers seeing what they can do on a computer or a disgruntled employee looking to get some money or information out of their company.
Some attacks don’t even require a large amount of technical know-how. It could be that software is not updated for a while or even giving open access to WiFi. Sometimes it can be as simple as the building management team not changing a password from its standardised settings so the building could be accessed by anyone.
Disrupted Denial of Service (DDoS) is a fairly recent form of cyber attack and is becoming more commonly used. Essentially, the network of an organisation is ‘flooded’ with data meaning the organisation cannot function. No damage is done nor data stolen, but the hacker can hold the organisation to ransom.
[edit] How safe are we from a cyber attack?
No network is 100% secure. Organisations have different levels of maturity in their cyber defences. The government has started taking cyber security much more seriously and recently launched the National Cyber Security Centre, a division of GCHQ that will be a new nerve centre to manage cyber incidents.
Responding to government advice, creating and adhering to good practices and procedures and ‘policing’ people, including the supply chain, will all reduce your risk of cyber attack.
Take an example of malicious software (malware) being embedded into the system of a crane that had been delivered to a sensitive construction site. The crane needed to be connected to the sites network to enable ‘reachback’ (where the device talks back to the manufacturer or supplier) for system monitoring and performance. In this case, the site security procedures were watertight – every device that needed to connect to the network needed to be scanned and in this case the malware was found.
[edit] With so many connected devices, is there more risk?
The market for the 'internet of things’ is constantly expanding, so it has to be taken as given that it will continue to be a more connected world. That doesn’t necessarily mean that there has to be more risk of cyber attacks. Instead, people need to be savvier about what they do. How many people leave their Bluetooth on, or choose an obvious password?
People going onto a construction site today will be given a safety briefing and protective equipment, and checked to ensure they are in the right condition to go on site. Yet, the site may have an open WiFi, leaving it open to attack. Cyber security needs to be considered in the same way that the health and safety of people is approached, and that will take a cultural shift.
[edit] How does cyber security link to London’s infrastructure?
Cities like London are becoming ‘smarter’; people, places, spaces, buildings, infrastructure and devices are becoming ‘connected’ to one another.
Already the technology is available to monitor how many vehicles are on a particular stretch of motorway at any one time. Using this, it could be possible, if that motorway was particularly busy, to redirect drivers via an alternative route.
Monitors could also be placed on a railway bridge, which gives engineers real time information about the condition of that bridge and lets them know if and when maintenance is required.
This technology is needed and wanted as it will make all infrastructure systems more efficient and make them easier to maintain. However, this infrastructure could also become more vulnerable to cyber attacks. It is important to consider the threat early enough so it can be mitigated easily and cheaply.
Everything electronic emits a signal which can be interrogated from afar. Smart devices are never off (unless their power source is removed) so thought needs to be placed around fabric of buildings and how material and equipment is designed.
It is necessary to think about how buildings can be made more secure. This involves thinking about things like the locations of server or hub rooms in relation to other equipment or the positioning of screens so that they are not in clear view through a window. Even where cables go and whether they are made from copper or fibre are considerations in making somewhere cyber secure.
[edit] What can civil engineers do to prevent attacks?
Being cyber secure is not about investing in more cyber. Civil engineers could have biometric sensors that check the identity of everyone coming in and out of a site, but if the database with those identities is insecure then it certainly isn’t helping to protect people.
Instead, it’s about being aware of how civil engineers could be at risk. If they have hard drives with files on it, then those files can be accessed, so properly disposing of them is vital. Even computer screens can have images burned onto them if they are used frequently, meaning someone can access information even from a blank screen.
For civil engineers, this is particularly important. They need to be aware (and are becoming increasingly so) of the forms that threats could take and how to protect the systems they use.
This article was originally published here on 27 Feb 2017 by ICE.
--The Institution of Civil Engineers
[edit] Related articles on Designing Buildings Wiki
- Articles by ICE on Designing Buildings Wiki.
- Big data.
- Critical infrastructure is more vulnerable than ever. It doesn’t have to be that way.
- Cyber-security and phishing.
- Cyber security and engineering.
- Cyber threats to building automation and control systems.
- Digital communications and infrastructure dependencies.
- Engineering resilience to human threats.
- Information and communications technology in construction.
- Intelligent building management systems IBMS.
- Internet of things.
- Protecting against online crime.
- Security and the built environment.
- Smart buildings.
- Smart technology.
- Vital infrastructure and redevelopment.
Featured articles and news
Twas the site before Christmas...
A rhyme for the industry and a thankyou to our supporters.
Plumbing and heating systems in schools
New apprentice pay rates coming into effect in the new year
Addressing the impact of recent national minimum wage changes.
EBSSA support for the new industry competence structure
The Engineering and Building Services Skills Authority, in working group 2.
Notes from BSRIA Sustainable Futures briefing
From carbon down to the all important customer: Redefining Retrofit for Net Zero Living.
Principal Designer: A New Opportunity for Architects
ACA launches a Principal Designer Register for architects.
A new government plan for housing and nature recovery
Exploring a new housing and infrastructure nature recovery framework.
Leveraging technology to enhance prospects for students
A case study on the significance of the Autodesk Revit certification.
Fundamental Review of Building Regulations Guidance
Announced during commons debate on the Grenfell Inquiry Phase 2 report.
CIAT responds to the updated National Planning Policy Framework
With key changes in the revised NPPF outlined.
Councils and communities highlighted for delivery of common-sense housing in planning overhaul
As government follows up with mandatory housing targets.
CIOB photographic competition final images revealed
Art of Building produces stunning images for another year.
HSE prosecutes company for putting workers at risk
Roofing company fined and its director sentenced.
Strategic restructure to transform industry competence
EBSSA becomes part of a new industry competence structure.
Major overhaul of planning committees proposed by government
Planning decisions set to be fast-tracked to tackle the housing crisis.
Industry Competence Steering Group restructure
ICSG transitions to the Industry Competence Committee (ICC) under the Building Safety Regulator (BSR).
Principal Contractor Competency Certification Scheme
CIOB PCCCS competence framework for Principal Contractors.
The CIAT Principal Designer register
Issues explained via a series of FAQs.