首页> 外文OA文献 >Intelligent buildings: An investigation into current and emerging security vulnerabilities in automated building systems using an applied defeat methodology
【2h】

Intelligent buildings: An investigation into current and emerging security vulnerabilities in automated building systems using an applied defeat methodology

机译:智能建筑:使用应用的失败方法对自动化建筑系统中当前和正在出现的安全漏洞进行调查

摘要

Intelligent Buildings (IB) have become increasing popular during the past decade, driven through the need to reduce energy, have more reactive and safer buildings, and increase productivity. IB integrate many systems that were in the past isolated from each other, including fire and life safety, HVAC, lighting, security, etc. Facilities contain commercial-in-confidence material and other valued assets; however, IB are integrated through open and common data communication protocols and hardware, leaving facilities exposed to external and internal threats. The study presents an investigation into IB, based on a defeat evaluation methdology. IB vulnerabilities considered two areas, namely physical and software vulnerabilties. Physical hardware vulnerabilities included physical access to the automation devices or workstations, communication networks, wiretapping, remote connectivity, foreign devices and local field programming. Software vulnerabilities included common connectivity protocols, restricted encryption and limited security considerations. These vulnerabilities could result in such attacks as denial of service, covert facilty entry or espionage. IB risks are contextual, aligned with the facility’s threat exposure; nevertheless, there are generic mitigation strategies that can be taken to protect IB systems. Protection includes situational threat driven security risk management, understanding system criticalities, integration of departments, a degree of network isolation and greater awareness.
机译:在过去的十年中,智能建筑(IB)在减少能源需求,拥有更多反应性和安全性的建筑物以及提高生产力的需求下变得越来越流行。 IB集成了过去彼此隔离的许多系统,包括消防和生命安全,HVAC,照明,保安等。设施中包含商业秘密材料和其他有价值的资产;但是,IB是通过开放的通用数据通信协议和硬件进行集成的,从而使设施面临外部和内部威胁。该研究基于失败评估方法对IB进行了调查。 IB漏洞考虑了两个领域,即物理和软件漏洞。物理硬件漏洞包括对自动化设备或工作站的物理访问,通信网络,窃听,远程连接,外部设备和本地现场编程。软件漏洞包括常见的连接协议,受限的加密和有限的安全考虑。这些漏洞可能导致诸如拒绝服务,秘密进入设备或间谍活动等攻击。 IB风险是与环境相关的,与机构的威胁风险保持一致;但是,可以采取一些通用的缓解策略来保护IB系统。保护包括由情境威胁驱动的安全风险管理,了解系统关键性,部门整合,一定程度的网络隔离和更高的意识。

著录项

  • 作者

    Brooks David J.;

  • 作者单位
  • 年度 2011
  • 总页数
  • 原文格式 PDF
  • 正文语种
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号