Building Manageme must now integrat

How to effectively monitor and configure building management systems (BMSs) continues to emerge as an issue in the management of property. The threat of cyber-attacks on BMS systems is increasingly becoming a very real risk issue.

Typically building and access control systems are computers that monitor and control building operations, such as air-conditioning, electrical power, electronic card reading, lifts, fire alarms and fire suppression systems, heating, lighting, ventilation and surveillance. Advances in building technology means these systems are invariably linked to all manner of other services and the internet. Its these very advancements in

technology and the ever increasing reliance on automation and remote operations that

is exposing these systems to possible cyber- breaches and full on attacks. Most BMS systems are typically not

designed with cyber security in mind. Although, increasingly experts have started to alert real estate and building owners and managers that such systems are vulnerable to external penetration. The advent and development of more

sophisticated insurance and risk mitigation technics means that options now exist to help defend against cyber threats to BMS systems.

Smart(er) buildings and their heightened exposure

Centralised building management systems are now integrated and connected into other building systems, these in turn are connected to a network ring with IT data centers and remote access servers

14 fmuk

used via open protocols and clear access. Building owners, managers and FM

providers have seen huge advantages in the “usability” of these systems but they are also highly susceptible to cyber risks as they are more complex and interconnected into IP networks which leaves them inevitably more exposed. Heating, lighting and security in most buildings are generally not being developed with technology designed to be connected into cross building IT networks. In fact, designers and decision makers in charge of facilities (Heating, lighting, security) or smart building systems can often consider the risks of cybersecurity to be irrelevant and non-critical.

Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44