2017 IEEE Symposium Series on Computational Intelligence (SSCI) 2017
DOI: 10.1109/ssci.2017.8285228
|View full text |Cite
|
Sign up to set email alerts
|

An introduction to buildings cybersecurity framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
11
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 23 publications
(11 citation statements)
references
References 5 publications
0
11
0
Order By: Relevance
“…Inability to properly control data generation and access has huge implications in terms of compliance issues, unintentional data loss, exposure of data to non-legitimate users and accumulation of poor quality data [54]. These challenges are especially difficult to overcome because cyber security is not among the driving trends of the digital age [62]. In the context of the FM sector, buildings can be considered easy targets for organized criminals who wish to research an organization as part of a targeted attack.…”
Section: Cyber Security and Data Privacymentioning
confidence: 99%
See 1 more Smart Citation
“…Inability to properly control data generation and access has huge implications in terms of compliance issues, unintentional data loss, exposure of data to non-legitimate users and accumulation of poor quality data [54]. These challenges are especially difficult to overcome because cyber security is not among the driving trends of the digital age [62]. In the context of the FM sector, buildings can be considered easy targets for organized criminals who wish to research an organization as part of a targeted attack.…”
Section: Cyber Security and Data Privacymentioning
confidence: 99%
“…There is no doubt that it is high time that the industry as a whole develops a strategic roadmap and specifies standards to support BDA initiatives [57]. The US National Institute of Standards and Technology has also released the Buildings Cyber-Security Framework which provides general guidance to building owners and operators to identify and implement a cyber-security risk management strategy to secure critical buildings Information Technology and Operational Technology [62]. Respectively in the UK, the government plans to invest a total of £1.9 billion over the next five years to transform significantly the country's cyber security and launch two new cyber innovation centres to drive the development of cutting-edge cyber products and dynamic new cyber security companies [66].…”
Section: Cyber Security and Data Privacymentioning
confidence: 99%
“…At the application layers, it means authenticating the identities of communicating devices. There are significant ongoing IT-based efforts to protect BAS (see Fisher, Isler, and Osborne 2019;Mylrea, Gourisetti, and Nicholls 2017; Buildings Cybersecurity Capability Maturity Model (B-C2M2) for examples). Some work has been done to identify cybersecurity standards for DERs such as PV and batteries (Johnson and Saleem 2017).…”
Section: Cybersecuritymentioning
confidence: 99%
“…The ITCF webtool is complemented by a "how-to" document that discusses the roles of the cybersecurity domains and their respective core elements in managing cybersecurity risks for organizations, the details are described in [11,12]. The ITCF also has the capability to compare the current and postcybersecurity posture of an organization before and after cyber mitigations, assessments, and investments.…”
Section: Itcf Webtoolmentioning
confidence: 99%