1 / 26

Resilience & Cyber Security in the Built Environment

Resilience & Cyber Security in the Built Environment. Hugh Boyes CEng FIET CISSP Principal Fellow, WMG. 29 th April 2014. Contents. What are Resilience & Cyber Security? Managing the threats Case Studies Improving our defences. What is Resilience?. Resilience

stefan
Download Presentation

Resilience & Cyber Security in the Built Environment

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Resilience & Cyber Securityin the Built Environment Hugh Boyes CEng FIET CISSP Principal Fellow, WMG 29th April 2014

  2. Contents What are Resilience & Cyber Security? Managing the threats Case Studies Improving our defences

  3. What is Resilience? Resilience Maintaining continuity of operations through an ability to adapt & respond rapidly to disruptions

  4. What is Cyber Security? People, Process, Technology

  5. Buncefield Oil Storage Depot knowledge & A lack of • skills Buncefield - severe local property damage and traffic disruption. £9.5m - fines & costs £750m civil damages

  6. Understanding threats

  7. Protecting your business The Built Environment

  8. Building Systems Intelligent = Complexity + Integration + Automation

  9. Complex cyber-physical systems

  10. Building/Industrial Control Systems

  11. Operational Control Centres Networks Communications Building systems

  12. Physical Security Control Centres

  13. Greater system connectivity!

  14. Demonstrations – physical v online Hactivism Online & electronic protest from the safety of your home or campus!

  15. BIM Pilot Project HMYOI Cookham Wood

  16. BIM - Design of security features

  17. What can go wrong? Case Studies

  18. The human factor Deliberate v Accidental Naïve v Malicious Careless v distracted Following procedure v Short cuts

  19. Vulnerable CCTV Systems Malware discovered Scanning TCP/IP port 5000 on HikvisionDVRs Installs Bitcoin mining software Source: SANS Technology Institute

  20. High profile/prestigious building Google’s hi-tech offices in Sydney

  21. A vulnerable control system 17/04/13 - Sydney Building system hacked

  22. Loss of power – loss of IT systems “We'd been waiting for three hours in the queue. There was no information and we couldn't find anyone to explain what we should be doing.” – Gatwick passenger, 2013

  23. Maximum Security Wing 13/08/13 - Prison computer ‘glitch’ blamed for opening cells doors Miami TGK Jail Miami-Dade County Jails

  24. The cyber-physical challenge Sports venue with 100,000 spectators Risks: Public safety/security Statutory (DPA) Financial (PCI DSS) Reputation

  25. Initiatives to support you Research Institute for Trustworthy Industrial Control Systems

  26. Any questions? Hugh Boyes CEng FIET CISSP Principal Fellow, Cyber Security Centre, WMG, University of Warwick haboyes@theiet.org

More Related