This page contains a Flash digital edition of a book.
BSEE FIRE & SECURITY


Advertising: 01622 699116 Editorial: 01354 461430


MANAGING YOUR VULNERABILITIES Getting cyber savvy with digital security


John White, Director Key Strategic Partners, Tyco, discusses IoT‐enabled access control and fire detection.


of everyday life, and for facilities managers that means a period of great opportunity, but also a range of new challenges. Security systems can now benefit from IP-enabled cameras and automatic analytics, decreasing admin time, improving accuracy and increasing the chances that an intruder will be quickly apprehended. Likewise, intelligent fire prevention installations can be calibrated to better understand incoming environmental information, reducing the chances of false fire alarms and speeding up alert times, so that fire incidents are more likely to be controlled. But these benefits come with difficulties – cyber attackers are increasingly targeting poorly- defended IoT devices as the gateway to company systems, for example. The recent worldwide ransomware attack which took down multiple NHS organisations showed the extent to which cyber attacks can impact on the real world. As a result, facilities managers have a responsibility to master these technologies safely, or risk damaging the organisations they serve as well as their own reputation.


C ‘


Vulnerable connections between security systems can pose a threat far greater than the compromise of one building – if a hacker uses a compromised camera to access the central control room, it could lead to catastrophic ripple effects elsewhere.


’ Secure your security


Over the past decade, the concept of ‘perimeter security’ for manufacturing facilities and warehouses has changed a great deal. Although the physical boundaries of a building must still be defended, the new connected aspect of many critical processes means that many industries are now open to attack from cyber criminals as well as on-the-ground thieves – or even both working together. The perimeter is now limitless; any connected camera or sensor which operates via the internet can be hacked and turned against its owner, feeding out sensitive data or opening loopholes in secure locations.


On top of that, many physical processes such as surveillance and access management are increasingly being managed from a central control facility with responsibility for multiple sites – which may not even be on the same continent as the facility being protected.


As such, vulnerable connections between security systems can pose a threat far greater than the compromise of one building – if a hacker uses a compromised camera to access the central control room, it could lead to catastrophic ripple effects elsewhere.


onnected technology is becoming increasingly common both in buildings and in safety and security systems. The so-called Internet of Things (IoT) will soon be a regular part


When evaluating security products before implementation, it is essential that managers are cyber savvy and consider how digital security is built into physical products. When constructing security systems, it is critical to understand how cameras and video management systems fit into existing network architectures, all without introducing new vulnerabilities. Cyber security must be a consideration at the earliest possible design stage.


Linked‐up knowledge


It’s not all doom and gloom, though. Access control will always be at the heart of the facility manager’s security function. Keeping unwanted people out of certain areas or entire buildings is essential to an effective defence, and with the ongoing merge between physical and digital spheres, that task is currently being transformed for the better, as the rise of IP-enabled security devices provides a raft of new capabilities for facilities managers, including data collection and analysis, linking up with other in-house security systems and consolidated administration. In this new landscape, facilities managers can increase their efficiency and the effectiveness of their systems through a combination of innovative products and integration, connecting devices and processes which were previously isolated or individually watched over by a lone operator. Managers need to take notice of the possibilities of the IoT and integrate their systems to get a single view over the movements of people and goods throughout their facilities.


So, for example, IoT-enabled cameras, scanners and gates can be programmed to grant access only to authorised people or only at specific times – for example, if a delivery driver arrives during his usual delivery time-slot he will be granted access, but if he arrives late in the evening, the system will bar entry. Or say someone arrives for a meeting on the 22nd floor, and decides to snoop about their competitors’ offices on the 27th as well while they’re there. IP-enabled security gates can feed their appointment information to the lift servers so that they ‘know’ not to let them up to their competitors.


This kind of smart integration can make the everyday job of security management easier, as well as providing considerable value-add services for clients. The risks are real, but the benefits more than outweigh them, and a carefully- implemented cyber security policy can help facilities managers reap the rewards without sacrificing the integrity of their systems.


Smart technology and reducing false alarms


Considerable advances are also being made in the fire prevention arena. For FMs looking to improve safety and reduce false and unwanted alarms, it is highly advisable to implement a well thought-out fire safety strategy taking into account the necessary risk assessments across each site’s possible triggers and fire scenarios. This is crucial in order to identify and eliminate the potential situations in which false and unwanted alarms could occur.


If an existing system has been prone to false alarms, it is advisable to look at incorporating intelligent fire alarm detection devices. For instance, the use of interactively adjusted algorithms can establish if the detected properties of carbon monoxide, heat or smoke correspond to those held in memory for real fire events. By utilising this type of detection technology, dust thrown up from machinery, for example, will not set off an alarm.


uZettler Profile panel. 32 BUILDING SERVICES & ENVIRONMENTAL ENGINEER JULY 2017


It can also be incredibly beneficial to have a wireless radio-enabled system in place to ensure


‘ When constructing security


systems, it is critical to understand how cameras and video management systems fit into existing network architectures, all without introducing new vulnerabilities. Cyber security must be a consideration at the earliest possible design stage.





uManual call point.


that detectors across the site are integrated – such as with the latest CCTV technology – to aid the early detection and verification of fires. This improves system functionality and performance. In the case of false alarms, CCTV cameras can also help to aid the early detection and verification of fires by allowing users to view the area to gain a fuller picture of the situation – acting as a secondary investigation strategy. Once a fire detection and alarm system is in place, although it might sound very basic, facilities teams must ensure that all staff tasked with using the fire controls are properly trained to do so. Installing the wrong type of fire extinguisher or an ill-advised escape route could mean the difference between life and death. Also, if the system is linked to an alarm receiving centre (ARC), and is scheduled for testing, facilities managers should inform the ARC before and after the event.


Stepping into the future


Ultimately, it must be noted that fire and security technology is not static. While keeping physical threats from entering the building and reducing the chances of a fire have long been priorities, a key focus should be managing the cyber- vulnerabilities and exploits that are uncovered every day.


A successful facilities manager needs to make sure that they are ahead of the curve with connected technology. With IoT-enabled access control and fire detection, they have the opportunity to gain a crucial upper hand in the defence and prevention process. It’s essential to take the opportunity to upgrade and upskill now, and take advantage of the new possibilities on offer – or risk being left behind.


http://www.tyco.com/ VISIT OUR WEBSITE: www.bsee.co.uk


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60  |  Page 61  |  Page 62  |  Page 63  |  Page 64  |  Page 65  |  Page 66  |  Page 67  |  Page 68  |  Page 69  |  Page 70  |  Page 71  |  Page 72  |  Page 73  |  Page 74  |  Page 75  |  Page 76  |  Page 77  |  Page 78  |  Page 79  |  Page 80  |  Page 81  |  Page 82  |  Page 83  |  Page 84  |  Page 85  |  Page 86  |  Page 87  |  Page 88  |  Page 89  |  Page 90  |  Page 91  |  Page 92  |  Page 93  |  Page 94  |  Page 95  |  Page 96  |  Page 97  |  Page 98  |  Page 99  |  Page 100  |  Page 101  |  Page 102  |  Page 103  |  Page 104  |  Page 105  |  Page 106  |  Page 107  |  Page 108  |  Page 109  |  Page 110  |  Page 111  |  Page 112  |  Page 113  |  Page 114  |  Page 115  |  Page 116  |  Page 117  |  Page 118  |  Page 119  |  Page 120  |  Page 121  |  Page 122  |  Page 123  |  Page 124  |  Page 125  |  Page 126  |  Page 127  |  Page 128  |  Page 129  |  Page 130  |  Page 131  |  Page 132  |  Page 133  |  Page 134  |  Page 135  |  Page 136  |  Page 137  |  Page 138  |  Page 139  |  Page 140  |  Page 141  |  Page 142  |  Page 143  |  Page 144  |  Page 145  |  Page 146  |  Page 147  |  Page 148  |  Page 149  |  Page 150  |  Page 151  |  Page 152  |  Page 153  |  Page 154  |  Page 155  |  Page 156  |  Page 157  |  Page 158  |  Page 159  |  Page 160  |  Page 161  |  Page 162  |  Page 163  |  Page 164  |  Page 165  |  Page 166  |  Page 167  |  Page 168  |  Page 169  |  Page 170  |  Page 171  |  Page 172  |  Page 173  |  Page 174  |  Page 175  |  Page 176  |  Page 177  |  Page 178  |  Page 179  |  Page 180  |  Page 181  |  Page 182  |  Page 183  |  Page 184  |  Page 185  |  Page 186  |  Page 187  |  Page 188  |  Page 189  |  Page 190  |  Page 191  |  Page 192  |  Page 193  |  Page 194  |  Page 195  |  Page 196  |  Page 197  |  Page 198  |  Page 199  |  Page 200  |  Page 201  |  Page 202  |  Page 203  |  Page 204  |  Page 205  |  Page 206  |  Page 207  |  Page 208  |  Page 209  |  Page 210  |  Page 211  |  Page 212  |  Page 213  |  Page 214  |  Page 215  |  Page 216  |  Page 217  |  Page 218  |  Page 219  |  Page 220  |  Page 221  |  Page 222  |  Page 223  |  Page 224  |  Page 225  |  Page 226  |  Page 227  |  Page 228  |  Page 229  |  Page 230  |  Page 231  |  Page 232  |  Page 233  |  Page 234  |  Page 235  |  Page 236  |  Page 237  |  Page 238  |  Page 239  |  Page 240  |  Page 241  |  Page 242  |  Page 243  |  Page 244  |  Page 245  |  Page 246  |  Page 247  |  Page 248  |  Page 249  |  Page 250  |  Page 251  |  Page 252  |  Page 253  |  Page 254  |  Page 255  |  Page 256  |  Page 257  |  Page 258  |  Page 259  |  Page 260  |  Page 261  |  Page 262  |  Page 263  |  Page 264  |  Page 265  |  Page 266  |  Page 267  |  Page 268  |  Page 269  |  Page 270  |  Page 271  |  Page 272  |  Page 273  |  Page 274  |  Page 275  |  Page 276  |  Page 277  |  Page 278  |  Page 279  |  Page 280  |  Page 281  |  Page 282  |  Page 283  |  Page 284  |  Page 285  |  Page 286  |  Page 287  |  Page 288  |  Page 289  |  Page 290  |  Page 291  |  Page 292  |  Page 293  |  Page 294  |  Page 295  |  Page 296  |  Page 297  |  Page 298  |  Page 299  |  Page 300  |  Page 301  |  Page 302  |  Page 303  |  Page 304  |  Page 305  |  Page 306  |  Page 307  |  Page 308  |  Page 309  |  Page 310  |  Page 311  |  Page 312  |  Page 313  |  Page 314  |  Page 315  |  Page 316  |  Page 317  |  Page 318  |  Page 319  |  Page 320  |  Page 321  |  Page 322  |  Page 323  |  Page 324  |  Page 325  |  Page 326  |  Page 327  |  Page 328  |  Page 329  |  Page 330  |  Page 331  |  Page 332  |  Page 333  |  Page 334  |  Page 335  |  Page 336  |  Page 337  |  Page 338  |  Page 339  |  Page 340  |  Page 341  |  Page 342  |  Page 343  |  Page 344  |  Page 345  |  Page 346  |  Page 347  |  Page 348  |  Page 349  |  Page 350  |  Page 351  |  Page 352  |  Page 353  |  Page 354  |  Page 355  |  Page 356  |  Page 357  |  Page 358  |  Page 359  |  Page 360  |  Page 361  |  Page 362  |  Page 363  |  Page 364  |  Page 365  |  Page 366  |  Page 367  |  Page 368  |  Page 369  |  Page 370  |  Page 371  |  Page 372  |  Page 373  |  Page 374  |  Page 375  |  Page 376