- Project plans
- Project activities
- Legislation and standards
- Industry context
Last edited 28 Nov 2018
Infrastructure and cyber attacks
 What types of cyber attacks are there?
Cyber attacks come in many different forms. Nowadays, when people think of cyber attacks they think large-scale – a group of hackers working on behalf of governments trying to find out state secrets for example. However, cyber attacks can come from anywhere – teenagers seeing what they can do on a computer or a disgruntled employee looking to get some money or information out of their company.
Some attacks don’t even require a large amount of technical know-how. It could be that software is not updated for a while or even giving open access to WiFi. Sometimes it can be as simple as the building management team not changing a password from its standardised settings so the building could be accessed by anyone.
Disrupted Denial of Service (DDoS) is a fairly recent form of cyber attack and is becoming more commonly used. Essentially, the network of an organisation is ‘flooded’ with data meaning the organisation cannot function. No damage is done nor data stolen, but the hacker can hold the organisation to ransom.
No network is 100% secure. Organisations have different levels of maturity in their cyber defences. The government has started taking cyber security much more seriously and recently launched the National Cyber Security Centre, a division of GCHQ that will be a new nerve centre to manage cyber incidents.
Take an example of malicious software (malware) being embedded into the system of a crane that had been delivered to a sensitive construction site. The crane needed to be connected to the sites network to enable ‘reachback’ (where the device talks back to the manufacturer or supplier) for system monitoring and performance. In this case, the site security procedures were watertight – every device that needed to connect to the network needed to be scanned and in this case the malware was found.
The market for the 'internet of things’ is constantly expanding, so it has to be taken as given that it will continue to be a more connected world. That doesn’t necessarily mean that there has to be more risk of cyber attacks. Instead, people need to be savvier about what they do. How many people leave their Bluetooth on, or choose an obvious password?
People going onto a construction site today will be given a safety briefing and protective equipment, and checked to ensure they are in the right condition to go on site. Yet, the site may have an open WiFi, leaving it open to attack. Cyber security needs to be considered in the same way that the health and safety of people is approached, and that will take a cultural shift.
Already the technology is available to monitor how many vehicles are on a particular stretch of motorway at any one time. Using this, it could be possible, if that motorway was particularly busy, to redirect drivers via an alternative route.
This technology is needed and wanted as it will make all infrastructure systems more efficient and make them easier to maintain. However, this infrastructure could also become more vulnerable to cyber attacks. It is important to consider the threat early enough so it can be mitigated easily and cheaply.
Everything electronic emits a signal which can be interrogated from afar. Smart devices are never off (unless their power source is removed) so thought needs to be placed around fabric of buildings and how material and equipment is designed.
It is necessary to think about how buildings can be made more secure. This involves thinking about things like the locations of server or hub rooms in relation to other equipment or the positioning of screens so that they are not in clear view through a window. Even where cables go and whether they are made from copper or fibre are considerations in making somewhere cyber secure.
 What can civil engineers do to prevent attacks?
Being cyber secure is not about investing in more cyber. Civil engineers could have biometric sensors that check the identity of everyone coming in and out of a site, but if the database with those identities is insecure then it certainly isn’t helping to protect people.
Instead, it’s about being aware of how civil engineers could be at risk. If they have hard drives with files on it, then those files can be accessed, so properly disposing of them is vital. Even computer screens can have images burned onto them if they are used frequently, meaning someone can access information even from a blank screen.
This article was originally published here on 27 Feb 2017 by ICE.
 Related articles on Designing Buildings Wiki
- Articles by ICE on Designing Buildings Wiki.
- Big data.
- Critical infrastructure is more vulnerable than ever. It doesn’t have to be that way.
- Cyber-security and phishing.
- Cyber security and engineering.
- Cyber threats to building automation and control systems.
- Digital communications and infrastructure dependencies.
- Engineering resilience to human threats.
- Information and communications technology in construction.
- Intelligent building management systems IBMS.
- Internet of things.
- Security and the built environment.
- Smart buildings.
- Smart technology.
- Vital infrastructure and redevelopment.
Featured articles and news
What future infrastructure provision might look like.
Highlighting the health benefits of home improvement.
Pavilions for music, entertainment, and leisure. Book review.
Broadening our understanding of Dublin’s chequered social history.
The charm of London's Cabmen's shelters.
Future Weather Files research tool looking for feedback.
Exploring the Colour Rendering Index.
Why it's important to find out what went wrong.
ECA reviews the shape of the construction job market.
Why proper room acoustics make a difference.
Initiative puts gas networks on the path to net zero.
WICE Woman Architectural Technologist of the Year 2019.
Traditional low-energy approaches to comfort.
Revisiting the McArthurGlen Designer Outlet in Ashford.
USA In-Use Version 6 is now available.
The rise of architectural barbarism.
In contentious political contexts heritage can be more fractious.