Cyber security
|
The Loss Prevention Standard (LSP 2082 : Issue 1.0), published by BRE Global in 2017, defines cyber security as: ‘A system of controls used to protect an organisation, its facilities and other assets (both physical & cyber) from cyber threats.’
Cyberspace is a conceptual world of interconnected digital technology; a virtual meeting place of Internet, databases, email, online networks and other electronic forums. It is the notional ‘space’ where computer networks are connected and communicate.
Cyber security comprises technologies, processes and controls used to protect computer hardware, software and data from attack from spammers, hackers, saboteurs, criminals and other unauthorised persons. Cyber security aims to prevent damage to systems and stop data being made inaccessible.
Cyber security has assumed a more critical role due to society’s increased dependence on computer systems, Wi-Fi, Bluetooth, and the growth of ‘smart’ devices and the Internet of things.
Critical government, national security, medical and financial organisations store vast amounts of electronic data, much of which is of a highly sensitive, personal, intellectual or financial nature. All such agencies face rapidly evolving security risks and so continually adjust their cyber defences, improving, upgrading and bolstering, and generally keeping one step ahead of cyber criminals.
This can be a particular problem in the built environment, where critical infrastructure may be subject to attacks, and the increasing automation of systems such as building management systems can make buildings vulnerable.
The General Data Protection Regulations (GDPR), introduced in Spring 2017, have made it obligatory for every company and organisation to take effective measures to protect personal data or risk being fined.
[edit] Threats to cyber security
As dependence on computer devices and the Internet has grown, so have the number of threats which can come from a multitude of sources, including:
- Denial of service.
- Eavesdropping.
- Keylogging
- Malware.
- Phishing.
- Ransomware.
- Spyware.
- Trojans.
- Viruses.
Defences to these threats include:
- Antivirus software.
- Authentication protocols.
- Authorisation processes.
- Computer access control.
- Encryption.
- Firewalls.
- Mobile secure gateways.
- Secure coding.
- Secure operating systems.
NB PwC Global, Digital procurement survey 2022, states: ‘Computer security, cybersecurity, or information technology security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.’
[edit] Related articles on Designing Buildings
- Adapting your technology to the new working normal.
- Cyber hygiene.
- Cyber resilience.
- Cyber security and engineering
- Cyber threats to building automation and control systems
- Cyber-physical system
- Cyber-security and phishing.
- Cyber security specialist.
- Infrastructure and cyber attacks
- Mitigating online risk.
Featured articles and news
First aid in the modern workplace with St John Ambulance.
Ireland's National Residential Retrofit Plan
Staged initiatives introduced step by step.
Solar panels, pitched roofs and risk of fire spread
60% increase in solar panel fires prompts tests and installation warnings.
Modernising heat networks with Heat interface unit
Why HIUs hold the key to efficiency upgrades.
Reflecting on the work of the CIOB Academy
Looking back on 2025 and where it's going next.
Procurement in construction: Knowledge hub
Brief, overview, key articles and over 1000 more covering procurement.
Sir John Betjeman’s love of Victorian church architecture.
Exchange for Change for UK deposit return scheme
The UK Deposit Management Organisation established to deliver Deposit Return Scheme unveils trading name.
A guide to integrating heat pumps
As the Future Homes Standard approaches Future Homes Hub publishes hints and tips for Architects and Architectural Technologists.
BSR as a standalone body; statements, key roles, context
Statements from key figures in key and changing roles.
ECA launches Welsh Election Manifesto
ECA calls on political parties at 100 day milestone to the Senedd elections.
Resident engagement as the key to successful retrofits
Retrofit is about people, not just buildings, from early starts to beyond handover.
Plastic, recycling and its symbol
Student competition winning, M.C.Esher inspired Möbius strip design symbolising continuity within a finite entity.
Do you take the lead in a circular construction economy?
Help us develop and expand this wiki as a resource for academia and industry alike.
Warm Homes Plan Workforce Taskforce
Risks of undermining UK’s energy transition due to lack of electrotechnical industry representation, says ECA.
Cost Optimal Domestic Electrification CODE
Modelling retrofits only on costs that directly impact the consumer: upfront cost of equipment, energy costs and maintenance costs.
The Warm Homes Plan details released
What's new and what is not, with industry reactions.























