search.noResults

search.searching

note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
odelling & Security


security design stakeholder who will ultimately be responsible for the security of the completed building.


For security consultants the main benefits are similar to those for other design team specialists, such as modelling of security- specific elements including realistic views from CCTV cameras; automated ‘clash detection’; verification of the design in a virtual environment; ease of coordination with other specialists; speed of quantification and cost control tasks; and of course, more effective presentation to the client and other stakeholders.


For security managers, depending on the level of BIM expertise in the wider design team, and the security consultant in particular, there can be significant benefits not only during design but in operation of the completed building. Stakeholders can be more easily involved in the project to a greater depth, and their requirements and changes incorporated more easily.


These are the commonly discussed selling points of BIM adoption, but as the level of detail captured in the model increases, so does the potential for more intelligent analysis and interpretation, which we are beginning to see with, for example, energy modelling. In the security design space BIM data provides an opportunity to change the way in which risks are identified and how mitigation techniques are measured effectively. At the simple end of the scale this may be providing a client with photorealistic 3D CCTV coverage maps; the tools to allow this basic overlay are already freely available from reputed manufacturers. Such simple tools provide an immediate enhancement to a security designer’s capability but there is potential to look further ahead to explore exciting opportunities for innovative client interaction, design and post occupancy support.


As an example, the criticality of spaces may be inferred using COBIE (Construction Operations Building Information Exchange) information already captured in the BIM model, allowing a designer to better prioritise the application of physical and technical security.


Once the building is in use, live usage statistics from the installed security devices could be used in combination with BIM model information to allow accurate failure prediction and more efficient and cost- effective maintenance contracts. As the quantity of information captured within BIM models continues to grow, security designers will increasingly be expected to demonstrate modelling, programming and analysis capability to allow clients to visualise their building.


What are the risks?


There are currently some immediate risks to entering into a fully BIM-designed construction project when compared to a ‘traditional’ CAD-based approach. These are essentially centred on the emerging nature of BIM and include additional effort on behalf of the client to get up to speed with BIM tools and capabilities, and the fact that not all design disciplines or specialists within a discipline are yet equally competent in understanding BIM, using the associated tools or maximising the benefits for the client.


These early adoption issues are beginning to disappear as the construction industry more widely adopts and implements BIM, and as standards continue to be developed. However, another risk is likely to remain and has already been addressed by a new PAS from CPNI; does the use of a shared platform with large amounts of data on your building increase the risk of that data being compromised? PAS 1192-5:2015 “Specification for security- minded building information modelling, digital built environments and smart asset management” was commissioned by CPNI, recognising the challenges that need to be addressed. It is available via http://shop.bsigroup.com/forms/PASs/PAS- 1192-5/ and supporting information from CPNI can be obtained at https://www.cpni.gov.uk/advice/Cross-cutting- advice/Digital-built-assets-and-environments/ . It takes the reader through a process which allows the benefits of BIM to still be achieved,


but introduces an appropriate and proportionate need-to-know approach in relation to the sharing and publication of information that could be exploited by those with hostile or malicious intent.


The PAS creates a new role, the Built Asset Security Manager (BASM), whose functions will exist not only during a project, but over the lifetime of the asset. Using combined knowledge of security and BIM, the role will be responsible for providing a holistic view of the security issues and threats to be addressed, as well as taking ownership for, and assisting in, the development, auditing and review of the resultant policies, processes and procedures.


For example, the BASM should set and manage the rules that ensure the entire design team does not receive access to the CCTV programming and configuration information.


In our recent experience, the inclusion of this standard in project BIM protocols has been inconsistent; however, the adoption of a security-minded approach should be considered in: the construction of new assets; the modification, fitting-out and maintenance of those already existing; the collection of asset information; the introduction of new building management systems; and when considering potential relocation options or disposal of assets.


Conclusions


Security professionals have an opportunity to drive the use of BIM in construction and fit- out projects for the good of our sector. While the processes, tools and standards used in designing and operating buildings using BIM models are developing, we can drive both the expectations of security design information and collaboration and the requirements that are placed on the secure management of building information.


While the adoption of BIM on projects and the extent to which its capabilities are used varies tremendously, this is the time for security managers to explore BIM’s benefits and for security consultants to plan to exceed their clients’ expectations. As dynamic users of a building, and one of the few who consider not just steady state but exception operation, we should be leading proponents of a technology that can help us to get things right first time and to understand the impact of new threats and opportunities as they emerge.


Mark Tucknutt Associate Director QCIC


www.qcic-group.com > © CI TY S ECURI TY MAGAZ INE – SUMMER 2016 www. c i t y s e cur i t yma ga z ine . com 17


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36