Infrastructure and cyber attacks
Kim Van Rooyen and Nathan Jones, both experts from Turner & Townsend, give their thoughts on cyber security in the built environment.
Contents |
[edit] What types of cyber attacks are there?
Cyber attacks come in many different forms. Nowadays, when people think of cyber attacks they think large-scale – a group of hackers working on behalf of governments trying to find out state secrets for example. However, cyber attacks can come from anywhere – teenagers seeing what they can do on a computer or a disgruntled employee looking to get some money or information out of their company.
Some attacks don’t even require a large amount of technical know-how. It could be that software is not updated for a while or even giving open access to WiFi. Sometimes it can be as simple as the building management team not changing a password from its standardised settings so the building could be accessed by anyone.
Disrupted Denial of Service (DDoS) is a fairly recent form of cyber attack and is becoming more commonly used. Essentially, the network of an organisation is ‘flooded’ with data meaning the organisation cannot function. No damage is done nor data stolen, but the hacker can hold the organisation to ransom.
[edit] How safe are we from a cyber attack?
No network is 100% secure. Organisations have different levels of maturity in their cyber defences. The government has started taking cyber security much more seriously and recently launched the National Cyber Security Centre, a division of GCHQ that will be a new nerve centre to manage cyber incidents.
Responding to government advice, creating and adhering to good practices and procedures and ‘policing’ people, including the supply chain, will all reduce your risk of cyber attack.
Take an example of malicious software (malware) being embedded into the system of a crane that had been delivered to a sensitive construction site. The crane needed to be connected to the sites network to enable ‘reachback’ (where the device talks back to the manufacturer or supplier) for system monitoring and performance. In this case, the site security procedures were watertight – every device that needed to connect to the network needed to be scanned and in this case the malware was found.
[edit] With so many connected devices, is there more risk?
The market for the 'internet of things’ is constantly expanding, so it has to be taken as given that it will continue to be a more connected world. That doesn’t necessarily mean that there has to be more risk of cyber attacks. Instead, people need to be savvier about what they do. How many people leave their Bluetooth on, or choose an obvious password?
People going onto a construction site today will be given a safety briefing and protective equipment, and checked to ensure they are in the right condition to go on site. Yet, the site may have an open WiFi, leaving it open to attack. Cyber security needs to be considered in the same way that the health and safety of people is approached, and that will take a cultural shift.
[edit] How does cyber security link to London’s infrastructure?
Cities like London are becoming ‘smarter’; people, places, spaces, buildings, infrastructure and devices are becoming ‘connected’ to one another.
Already the technology is available to monitor how many vehicles are on a particular stretch of motorway at any one time. Using this, it could be possible, if that motorway was particularly busy, to redirect drivers via an alternative route.
Monitors could also be placed on a railway bridge, which gives engineers real time information about the condition of that bridge and lets them know if and when maintenance is required.
This technology is needed and wanted as it will make all infrastructure systems more efficient and make them easier to maintain. However, this infrastructure could also become more vulnerable to cyber attacks. It is important to consider the threat early enough so it can be mitigated easily and cheaply.
Everything electronic emits a signal which can be interrogated from afar. Smart devices are never off (unless their power source is removed) so thought needs to be placed around fabric of buildings and how material and equipment is designed.
It is necessary to think about how buildings can be made more secure. This involves thinking about things like the locations of server or hub rooms in relation to other equipment or the positioning of screens so that they are not in clear view through a window. Even where cables go and whether they are made from copper or fibre are considerations in making somewhere cyber secure.
[edit] What can civil engineers do to prevent attacks?
Being cyber secure is not about investing in more cyber. Civil engineers could have biometric sensors that check the identity of everyone coming in and out of a site, but if the database with those identities is insecure then it certainly isn’t helping to protect people.
Instead, it’s about being aware of how civil engineers could be at risk. If they have hard drives with files on it, then those files can be accessed, so properly disposing of them is vital. Even computer screens can have images burned onto them if they are used frequently, meaning someone can access information even from a blank screen.
For civil engineers, this is particularly important. They need to be aware (and are becoming increasingly so) of the forms that threats could take and how to protect the systems they use.
This article was originally published here on 27 Feb 2017 by ICE.
--The Institution of Civil Engineers
[edit] Related articles on Designing Buildings Wiki
- Articles by ICE on Designing Buildings Wiki.
- Big data.
- Critical infrastructure is more vulnerable than ever. It doesn’t have to be that way.
- Cyber-security and phishing.
- Cyber security and engineering.
- Cyber threats to building automation and control systems.
- Digital communications and infrastructure dependencies.
- Engineering resilience to human threats.
- Information and communications technology in construction.
- Intelligent building management systems IBMS.
- Internet of things.
- Protecting against online crime.
- Security and the built environment.
- Smart buildings.
- Smart technology.
- Vital infrastructure and redevelopment.
Featured articles and news
Shading for housing, a design guide
A look back at embedding a new culture of shading.
The Architectural Technology Awards
The AT Awards 2025 are open for entries!
ECA Blueprint for Electrification
The 'mosaic of interconnected challenges' and how to deliver the UK’s Transition to Clean Power.
Grenfell Tower Principal Contractor Award notice
Tower repair and maintenance contractor announced as demolition contractor.
Passivhaus social homes benefit from heat pump service
Sixteen new homes designed and built to achieve Passivhaus constructed in Dumfries & Galloway.
CABE Publishes Results of 2025 Building Control Survey
Concern over lack of understanding of how roles have changed since the introduction of the BSA 2022.
British Architectural Sculpture 1851-1951
A rich heritage of decorative and figurative sculpture. Book review.
A programme to tackle the lack of diversity.
Independent Building Control review panel
Five members of the newly established, Grenfell Tower Inquiry recommended, panel appointed.
Welsh Recharging Electrical Skills Charter progresses
ECA progressing on the ‘asks’ of the Recharging Electrical Skills Charter at the Senedd in Wales.
A brief history from 1890s to 2020s.
CIOB and CORBON combine forces
To elevate professional standards in Nigeria’s construction industry.
Amendment to the GB Energy Bill welcomed by ECA
Move prevents nationally-owned energy company from investing in solar panels produced by modern slavery.
Gregor Harvie argues that AI is state-sanctioned theft of IP.
Experimental AI housing target help for councils
Experimental AI could help councils meet housing targets by digitising records.
BSRIA Occupant Wellbeing survey BOW
Occupant satisfaction and wellbeing tool inc. physical environment, indoor facilities, functionality and accessibility.