Security and Privacy in Cyber‐Physical Systems 2017
DOI: 10.1002/9781119226079.ch16
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security of Smart Buildings

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
2

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(24 citation statements)
references
References 20 publications
0
6
0
2
Order By: Relevance
“…Every plant has to be segmented into zones which are a core security practice falling under the best practices. This can be used by every plant to be a part of their holistic defence-in-depth security approach so as to be able to help limit the access to systems of safety [5][6][7][8][9][10][11][12].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Every plant has to be segmented into zones which are a core security practice falling under the best practices. This can be used by every plant to be a part of their holistic defence-in-depth security approach so as to be able to help limit the access to systems of safety [5][6][7][8][9][10][11][12].…”
Section: Discussionmentioning
confidence: 99%
“…There are features of security software which will be able to restrict wireless and wired accesses to that of the infrastructure of a network. Companies are using authorisation and authentication security which is a primary element in the interface software connecting human to machines and they can limit the access to safety systems to that of individuals who are only authorised [10][11][12][13][14].…”
Section: Discussionmentioning
confidence: 99%
“…Günümüzde insanların konfordan beklentilerini karşılamanın yanı sıra güvenlik en önemli faktörlerin başında gelmektedir [12]. Bir binadaki güvenlik sistemleri, kontrol edilen bölgelerdeki detektörler, verilerin toplanarak değerlendirildiği kontrol üniteleri ve bu ünitelerin denetlendiği uyarı elemanlarından oluşmaktadır [13].…”
Section: Akilli Bi̇nalarda Güvenli̇kunclassified
“…Cyber-related attacks can target either the network or the device layers of a cyberphysical energy management system to either gain access to the equipment being monitored and controlled or as an entry point into other IT systems (e.g., financial, security), also known as vector attacks. While vector attacks are of higher risk due to the information being targeted, they are also easier to protect against through separation and segmentation of network systems (Wendzel et al 2018). In addition to network segmentation, system hardening, encrypting, authenticating accounts, documenting connection and access points, anonymizing data, and selecting upgradeable infrastructure that are regularly patched are all necessary to protect systems.…”
Section: Cybersecuritymentioning
confidence: 99%