SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Downloaden Sie, um offline zu lesen
Can you Trust your Smart
Building?
Understand the security issues associated
with ‘smart’ building systems and why they
are important to you
Duncan Purves | 2 Insight Ltd | duncan@2insight.co.uk
Smart Building – A complex System of Systems
Lighting
Occupancy
sensing
HVAC
Fans, Variable Air Volume,
Air Quality, Maintenance
Water
Smart Meters,
Flow Sensors
Fire/Safety
Detectors,
Functionality &
Compliance Checks
Security/Access
Cameras, Badge Readers, Doors,
Floors, Occupancy, Perimeters
Elevators
Breakdown Alerts,
Maintenance, Performance
Power/Energy Management
Smart Meters
Parking
Lot Utilisation
Digital Signage
Electronic Displays
Benefits
Savings in energy and water usage
Reduction in costs and carbon footprint
Improved working conditions, safety and security
for occupants
Improved customer service levels
Visibility and management of occupancy levels
Optimisation of resources (physical, space and
human)
Reduced maintenance costs
IoT for intelligent buildings
global market
is expected to grow from
$6.3 billion in 2017 to
$22.2 billion in 2026
Source:
Navigant Research, 2017, “IoT for Intelligent Buildings”
https://www.navigantresearch.com/reports/iot-for-intelligent-buildings
Risks - IoT devices and networks
Deployment of sensors and IoT networks introduces new:
§ System elements and components that can be exposed
to possible attacks (attack surface)
§ Mechanisms by which the attack can take place (attack
vectors)
Cyber Criminals
States and state sponsored
Hacktivists
Malicious insiders (employees)
Potential damage to an organisation or individual
Through poor security practice could impact:
§ Reputation
§ Share price
§ Costs (operational, replacement, sales, legal, fines etc.)
§ Health & Safety
Bring your own IoT Device or Network - Shadow IoT
Shadow IoT (the use of unauthorized Internet of Things devices and
networks) poses a new level of threats for enterprises
2018 Infoblox report found that:
§ A third of enterprise companies have more than 1,000 shadow-IoT
devices connected to their networks on a typical day
§ A quarter of US employees are unclear as to whether their
organization has an IoT security policy
§ 20 percent of UK employees rarely or never follow security policy
for personal and IoT devices
Criminals Hacked a Fish Tank to Steal Data from a Casino
In 2017, it was revealed that criminals had managed to steal 10GB of data from a North American
casino high-roller database via an internet connected thermometer in a lobby aquarium
Cybercriminals Hack Into Factory
In 2012, Hackers exploited vulnerabilities in industrial heating systems which
were connected to the internet, and then changed the temperature inside the
buildings. Utilised a flaw in the building management software.
Source: https://www.fastcompany.com/3008148/cybercriminals-hack-factory
Poor installation by electricians and HVAC engineers who don’t understand security can
lead to BMS controllers being exposed on the public internet and vulnerable to attacks
https://www.pentestpartners.com/security-blog/too-cold-to-work-school-closed-sure-your-bms-hasnt-been-hacked/
Shodan
School’s Boiler Room Unsecured BMS
I can create a new user
Your building could become part of Botnet to launch DDoS
attacks
In 2016, Mirai malware infected CCTV video cameras and digital video recorders and was
used to launch a DDoS attack that caused a massive Internet outage affecting Twitter,
Amazon, Tumblr, Reddit, Spotify and Netflix
No-one would
be interested in
hacking us,
we’re not a
bank
Source: Beazley Group
Unintended victim of collateral damage
WannaCry - May 2017
§ Over 200,000 devices infected in more than 150 Nations
§ Impacted FedEx, Spanish telecoms and gas companies, French
Renault car production factories, Russian interior ministry, and the
U.K. National Health Service
Maersk wasn't the only company affected:
Pharma giant Merck was, FedEx, WPP and TNT were also hit
Security Best Practice, Policies and Procedures
Protecting your investments in Smart Buildings requires a structured approach
to implementing and maintaining security best practice, policies and procedures
US National Institute of Standards and Technology (NIST)
“Framework for Improving Critical Infrastructure Cybersecurity”
Core Functions
Common flow of information and decisions at the
following levels within an organization
NIST
Framework
Core Functions &
Categories
Preparing for your Risk Assessment
Example Questions
§ Have you identified your critical digital assets? Not all systems and data are
created equal.
§ Have you identified which systems are critical for health and safety reasons
and therefore must be fail-safe?
§ Do you have and maintain lists of all your assets (devices, software, and any
sensitive information/data)? If so, do you know who has access to them and
where the data resides?
§ Are you able to detect unusual behaviour/activity on your network/do you
use real time monitoring solutions?
§ Would you know if a rogue device came on to the system?
§ If the building systems are attacked do you have processes and policies in
place and are your staff familiar with these?
Stakeholder Responsibilities
Cyber Security Role Stakeholder/Actor
Vision, purpose and objectives – how will the building be used and what cyber security threat
landscape might it experience? How will cyber security be managed and maintained in the life of the
building?
Occupier and/or Developer in conjunction
with the Architect.
Building Design – what cyber security goals and standards should be met? What cyber security
functions will be delivered, and by which systems? Ensuring that security requirements are specified
for procurement.
Architect, Engineers
Systems Design – ensuring that cyber security foundations and key functions are built into
individual systems and components (e.g. HVAC, fire and security, lifts etc.) and that individual
systems can operate securely with others.
Systems and Device Manufacturers
Build and Integration – ensuring that security requirements are correctly procured and integrated
and set up to correct security configurations.
Building Contractor, Engineers
Facilities Operation/Maintenance – managing and maintaining secure system operation,
configurations and secure access for maintenance.
Facilities Management, Engineers, Systems
Manufacturers
Systems Maintenance – keeping security up to date (e.g. patches) and supporting facilities
management in having patches applied.
Systems and Device Manufacturers
Building Occupation - Integration of security status reporting and management with enterprise
cyber security – e.g. identity management, vulnerability status & alert detection.
Building Occupier, Facilities Management
Source: IoT Security Foundation, “Can you Trust your Building’, Whitepaper
IoT Security Foundation Whitepaper and other Best
Practice Guides are available for download:
https://www.iotsecurityfoundation.org/best-practice-
guidelines/
To find out how you can be involved with the Smart
Buildings Working Group, please contact:
smartbuildings@iotsecurityfoundation.org
Secure IoT Conference | 7th November 2019
Green Park Conference Centre, Reading
Learn about Risks & Threats | Best Practice | Meet Experts
https://tvsecureiot.uk
MEET LEADING EXPERTS
Confirmed Speakers
§ Amazon Web Services
§ Arm
§ Copper Horse
§ Device Authority
§ GSMA
§ IBM
§ IoT Security Foundation
§ Knowledge Transfer Network
§ NCC Group
§ Pen Test Partners
§ SAS
https://www.eventbrite.co.uk/e/secure-iot-2019-tickets-59043403409
20% Discount for IoT Thames Valley Members
Promo code: IOTTV19
Student/Academic Ticket

Weitere ähnliche Inhalte

Was ist angesagt?

LG CNS Smart Building Solution
LG CNS Smart Building SolutionLG CNS Smart Building Solution
LG CNS Smart Building Solution
Lahee Kim
 
Strategy Institute Smartbuilding
Strategy Institute SmartbuildingStrategy Institute Smartbuilding
Strategy Institute Smartbuilding
CABA
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Ryan Smith
 

Was ist angesagt? (20)

Cyber Security in Smart Buildings
Cyber Security in Smart Buildings Cyber Security in Smart Buildings
Cyber Security in Smart Buildings
 
6 Applications of IoT for Building Automation Solutions
6 Applications of IoT for Building Automation Solutions6 Applications of IoT for Building Automation Solutions
6 Applications of IoT for Building Automation Solutions
 
Evolutions to Smart Buildings
Evolutions to Smart BuildingsEvolutions to Smart Buildings
Evolutions to Smart Buildings
 
LG CNS Smart Building Solution
LG CNS Smart Building SolutionLG CNS Smart Building Solution
LG CNS Smart Building Solution
 
Intelligent Buildings standards
Intelligent Buildings standardsIntelligent Buildings standards
Intelligent Buildings standards
 
Intelligent Buildings
Intelligent BuildingsIntelligent Buildings
Intelligent Buildings
 
Strategy Institute Smartbuilding
Strategy Institute SmartbuildingStrategy Institute Smartbuilding
Strategy Institute Smartbuilding
 
Seminar ppt...; )
Seminar ppt...; )Seminar ppt...; )
Seminar ppt...; )
 
Smart buildings
Smart buildingsSmart buildings
Smart buildings
 
The Symbiosis of Smart Buildings and Smart Workplaces
The Symbiosis of Smart Buildings and Smart WorkplacesThe Symbiosis of Smart Buildings and Smart Workplaces
The Symbiosis of Smart Buildings and Smart Workplaces
 
Demystifying the IoT in Smart Buildings
Demystifying the IoT in Smart BuildingsDemystifying the IoT in Smart Buildings
Demystifying the IoT in Smart Buildings
 
Collusion and Fraud Detection on Electronic Energy Meters
Collusion and Fraud Detection on Electronic Energy Meters Collusion and Fraud Detection on Electronic Energy Meters
Collusion and Fraud Detection on Electronic Energy Meters
 
Internet of Things - An Analysis of Smart Buildings
Internet of Things - An Analysis of Smart BuildingsInternet of Things - An Analysis of Smart Buildings
Internet of Things - An Analysis of Smart Buildings
 
Requirements for IoT platform technology
Requirements for IoT platform technologyRequirements for IoT platform technology
Requirements for IoT platform technology
 
ULIS in "Smart Buildings"
ULIS in "Smart Buildings" ULIS in "Smart Buildings"
ULIS in "Smart Buildings"
 
Smart building
Smart buildingSmart building
Smart building
 
VET4SBO Level 1 module 4 - unit 1 - v0.9 en
VET4SBO Level 1   module 4 - unit 1 - v0.9 enVET4SBO Level 1   module 4 - unit 1 - v0.9 en
VET4SBO Level 1 module 4 - unit 1 - v0.9 en
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Union - smart home and building technology and automation
Union - smart home and building technology and automation Union - smart home and building technology and automation
Union - smart home and building technology and automation
 
Next Dimension + Cisco Smart Manufacturing
Next Dimension + Cisco Smart ManufacturingNext Dimension + Cisco Smart Manufacturing
Next Dimension + Cisco Smart Manufacturing
 

Ähnlich wie Can you trust your smart building

SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
Patricia M Watson
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
Tiffany Graham
 

Ähnlich wie Can you trust your smart building (20)

Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report Summary
 
Be wp cybersmart_buildings
Be wp cybersmart_buildingsBe wp cybersmart_buildings
Be wp cybersmart_buildings
 
Cybersmart_buildings_securing your investment in connectivity and automation
Cybersmart_buildings_securing your investment in connectivity and automationCybersmart_buildings_securing your investment in connectivity and automation
Cybersmart_buildings_securing your investment in connectivity and automation
 
Be wp cybersmart_buildings (1)
Be wp cybersmart_buildings (1)Be wp cybersmart_buildings (1)
Be wp cybersmart_buildings (1)
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts
 
sample assignment
sample assignmentsample assignment
sample assignment
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
SCADA Security Webinar
SCADA Security WebinarSCADA Security Webinar
SCADA Security Webinar
 
Security and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsSecurity and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical Systems
 
How Technology is Revolutionizing Integrated Facilities Management.pdf
How Technology is Revolutionizing Integrated Facilities Management.pdfHow Technology is Revolutionizing Integrated Facilities Management.pdf
How Technology is Revolutionizing Integrated Facilities Management.pdf
 
CCA study group
CCA study groupCCA study group
CCA study group
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
 
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
 

Mehr von Duncan Purves

Mehr von Duncan Purves (20)

Supporting Elderly Independent Living with IOT devices
Supporting Elderly Independent Living with IOT devicesSupporting Elderly Independent Living with IOT devices
Supporting Elderly Independent Living with IOT devices
 
The Internet of Trees (IoTr) and is the IoT really sustainable?
The Internet of Trees (IoTr) and is the IoT really sustainable?The Internet of Trees (IoTr) and is the IoT really sustainable?
The Internet of Trees (IoTr) and is the IoT really sustainable?
 
Insights into the IoT market
Insights into the IoT marketInsights into the IoT market
Insights into the IoT market
 
Meeting the NIS Directive with Distributed Ledgers
Meeting the NIS Directive with Distributed LedgersMeeting the NIS Directive with Distributed Ledgers
Meeting the NIS Directive with Distributed Ledgers
 
Extending the reach of IoT to address global scale challenges
Extending the reach of IoT to address global scale challengesExtending the reach of IoT to address global scale challenges
Extending the reach of IoT to address global scale challenges
 
Smart Cities: A new development
Smart Cities: A new developmentSmart Cities: A new development
Smart Cities: A new development
 
Saving lives on British Railways with IQRF
Saving lives on British Railways with IQRFSaving lives on British Railways with IQRF
Saving lives on British Railways with IQRF
 
5G and Connected Communities
5G and Connected Communities5G and Connected Communities
5G and Connected Communities
 
AWS IoT and Alexa in the connected home
AWS IoT and Alexa in the connected homeAWS IoT and Alexa in the connected home
AWS IoT and Alexa in the connected home
 
PSA Certified – building trust in IoT
PSA Certified – building trust in IoTPSA Certified – building trust in IoT
PSA Certified – building trust in IoT
 
Smart City Challenge calls
Smart City Challenge callsSmart City Challenge calls
Smart City Challenge calls
 
Vodafone's NB-IoT Rollout
Vodafone's NB-IoT RolloutVodafone's NB-IoT Rollout
Vodafone's NB-IoT Rollout
 
Are you prepared for R&D funding
Are you prepared for R&D fundingAre you prepared for R&D funding
Are you prepared for R&D funding
 
Thames Valley Berkshire Smart City Cluster Challenge
Thames Valley Berkshire Smart City Cluster ChallengeThames Valley Berkshire Smart City Cluster Challenge
Thames Valley Berkshire Smart City Cluster Challenge
 
World Bee Project - The Connected Hive & The Future of Farming
World Bee Project - The Connected Hive & The Future of FarmingWorld Bee Project - The Connected Hive & The Future of Farming
World Bee Project - The Connected Hive & The Future of Farming
 
Bridging the gap between hardware and the cloud
Bridging the gap between hardware and the cloudBridging the gap between hardware and the cloud
Bridging the gap between hardware and the cloud
 
Cyber Academic Startup Accelerator Programme
Cyber Academic Startup Accelerator ProgrammeCyber Academic Startup Accelerator Programme
Cyber Academic Startup Accelerator Programme
 
Digital buildings
Digital buildingsDigital buildings
Digital buildings
 
The University of Sheffield AMRC
The University of Sheffield AMRCThe University of Sheffield AMRC
The University of Sheffield AMRC
 
Supervised Manufacturing
Supervised ManufacturingSupervised Manufacturing
Supervised Manufacturing
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Kürzlich hochgeladen (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Can you trust your smart building

  • 1. Can you Trust your Smart Building? Understand the security issues associated with ‘smart’ building systems and why they are important to you Duncan Purves | 2 Insight Ltd | duncan@2insight.co.uk
  • 2. Smart Building – A complex System of Systems Lighting Occupancy sensing HVAC Fans, Variable Air Volume, Air Quality, Maintenance Water Smart Meters, Flow Sensors Fire/Safety Detectors, Functionality & Compliance Checks Security/Access Cameras, Badge Readers, Doors, Floors, Occupancy, Perimeters Elevators Breakdown Alerts, Maintenance, Performance Power/Energy Management Smart Meters Parking Lot Utilisation Digital Signage Electronic Displays
  • 3. Benefits Savings in energy and water usage Reduction in costs and carbon footprint Improved working conditions, safety and security for occupants Improved customer service levels Visibility and management of occupancy levels Optimisation of resources (physical, space and human) Reduced maintenance costs
  • 4. IoT for intelligent buildings global market is expected to grow from $6.3 billion in 2017 to $22.2 billion in 2026 Source: Navigant Research, 2017, “IoT for Intelligent Buildings” https://www.navigantresearch.com/reports/iot-for-intelligent-buildings
  • 5. Risks - IoT devices and networks Deployment of sensors and IoT networks introduces new: § System elements and components that can be exposed to possible attacks (attack surface) § Mechanisms by which the attack can take place (attack vectors)
  • 6. Cyber Criminals States and state sponsored Hacktivists Malicious insiders (employees)
  • 7. Potential damage to an organisation or individual Through poor security practice could impact: § Reputation § Share price § Costs (operational, replacement, sales, legal, fines etc.) § Health & Safety
  • 8. Bring your own IoT Device or Network - Shadow IoT Shadow IoT (the use of unauthorized Internet of Things devices and networks) poses a new level of threats for enterprises 2018 Infoblox report found that: § A third of enterprise companies have more than 1,000 shadow-IoT devices connected to their networks on a typical day § A quarter of US employees are unclear as to whether their organization has an IoT security policy § 20 percent of UK employees rarely or never follow security policy for personal and IoT devices
  • 9. Criminals Hacked a Fish Tank to Steal Data from a Casino In 2017, it was revealed that criminals had managed to steal 10GB of data from a North American casino high-roller database via an internet connected thermometer in a lobby aquarium
  • 10. Cybercriminals Hack Into Factory In 2012, Hackers exploited vulnerabilities in industrial heating systems which were connected to the internet, and then changed the temperature inside the buildings. Utilised a flaw in the building management software. Source: https://www.fastcompany.com/3008148/cybercriminals-hack-factory
  • 11. Poor installation by electricians and HVAC engineers who don’t understand security can lead to BMS controllers being exposed on the public internet and vulnerable to attacks https://www.pentestpartners.com/security-blog/too-cold-to-work-school-closed-sure-your-bms-hasnt-been-hacked/
  • 13. School’s Boiler Room Unsecured BMS I can create a new user
  • 14. Your building could become part of Botnet to launch DDoS attacks In 2016, Mirai malware infected CCTV video cameras and digital video recorders and was used to launch a DDoS attack that caused a massive Internet outage affecting Twitter, Amazon, Tumblr, Reddit, Spotify and Netflix
  • 15. No-one would be interested in hacking us, we’re not a bank Source: Beazley Group
  • 16. Unintended victim of collateral damage WannaCry - May 2017 § Over 200,000 devices infected in more than 150 Nations § Impacted FedEx, Spanish telecoms and gas companies, French Renault car production factories, Russian interior ministry, and the U.K. National Health Service Maersk wasn't the only company affected: Pharma giant Merck was, FedEx, WPP and TNT were also hit
  • 17. Security Best Practice, Policies and Procedures Protecting your investments in Smart Buildings requires a structured approach to implementing and maintaining security best practice, policies and procedures US National Institute of Standards and Technology (NIST) “Framework for Improving Critical Infrastructure Cybersecurity” Core Functions
  • 18. Common flow of information and decisions at the following levels within an organization
  • 20. Preparing for your Risk Assessment Example Questions § Have you identified your critical digital assets? Not all systems and data are created equal. § Have you identified which systems are critical for health and safety reasons and therefore must be fail-safe? § Do you have and maintain lists of all your assets (devices, software, and any sensitive information/data)? If so, do you know who has access to them and where the data resides? § Are you able to detect unusual behaviour/activity on your network/do you use real time monitoring solutions? § Would you know if a rogue device came on to the system? § If the building systems are attacked do you have processes and policies in place and are your staff familiar with these?
  • 21. Stakeholder Responsibilities Cyber Security Role Stakeholder/Actor Vision, purpose and objectives – how will the building be used and what cyber security threat landscape might it experience? How will cyber security be managed and maintained in the life of the building? Occupier and/or Developer in conjunction with the Architect. Building Design – what cyber security goals and standards should be met? What cyber security functions will be delivered, and by which systems? Ensuring that security requirements are specified for procurement. Architect, Engineers Systems Design – ensuring that cyber security foundations and key functions are built into individual systems and components (e.g. HVAC, fire and security, lifts etc.) and that individual systems can operate securely with others. Systems and Device Manufacturers Build and Integration – ensuring that security requirements are correctly procured and integrated and set up to correct security configurations. Building Contractor, Engineers Facilities Operation/Maintenance – managing and maintaining secure system operation, configurations and secure access for maintenance. Facilities Management, Engineers, Systems Manufacturers Systems Maintenance – keeping security up to date (e.g. patches) and supporting facilities management in having patches applied. Systems and Device Manufacturers Building Occupation - Integration of security status reporting and management with enterprise cyber security – e.g. identity management, vulnerability status & alert detection. Building Occupier, Facilities Management Source: IoT Security Foundation, “Can you Trust your Building’, Whitepaper
  • 22. IoT Security Foundation Whitepaper and other Best Practice Guides are available for download: https://www.iotsecurityfoundation.org/best-practice- guidelines/ To find out how you can be involved with the Smart Buildings Working Group, please contact: smartbuildings@iotsecurityfoundation.org
  • 23. Secure IoT Conference | 7th November 2019 Green Park Conference Centre, Reading Learn about Risks & Threats | Best Practice | Meet Experts https://tvsecureiot.uk
  • 24. MEET LEADING EXPERTS Confirmed Speakers § Amazon Web Services § Arm § Copper Horse § Device Authority § GSMA § IBM § IoT Security Foundation § Knowledge Transfer Network § NCC Group § Pen Test Partners § SAS
  • 25. https://www.eventbrite.co.uk/e/secure-iot-2019-tickets-59043403409 20% Discount for IoT Thames Valley Members Promo code: IOTTV19 Student/Academic Ticket