This website uses cookies primarily for visitor analytics. Certain pages will ask you to fill in contact details to receive additional information. On these pages you have the option of having the site log your details for future visits. Indicating you want the site to remember your details will place a cookie on your device. To view our full cookie policy, please click here. You can also view it at any time by going to our Contact Us page.

IET works to establish intelligent building standards

02 July 2013

The IET is undertaking work to develop standards of good practice for protecting intellectual property and the design and operation of building systems.

Image: Shutterstock
Image: Shutterstock

The Institution of Engineering & Technology's (IET’s) technical briefing - Resilience and Cyber Security of Technology in the Built Environment - has been developed by industry experts with the support of the Centre for Protection of National Infrastructure (CPNI).

The document examines the issues in relation to the building's life-cycle; from concept, through design, construction, fit-out and operation, to its eventual decommissioning and demolition.

Hugh Boyes, the IET’s cyber security expert, said: “Our society is increasingly moving towards the creation of intelligent or smart buildings for economic and environmental reasons.  

“In an intelligent building a range of systems will be integrated to improve the efficiency of the building's operations, particularly its utility consumption, and to improve the occupants’ enjoyment of the accommodation.  

“From a resilience perspective the additional complexity increases the risk of systems failure which could simply cause inconvenience or in some circumstances lead to serious injury or loss of life. In terms of cyber security there is increased risk of corruption or hackers interfering with the safe and secure operation and occupancy of the building.

“This technical briefing examines the different sources of threats across the building lifecycle from initial concept through to decommissioning. It considers potential threat agents that could cause or contribute to a cyber security incident and identifies some of the measures that may be appropriate to reduce the risks.”

The briefing can be downloaded here. The document is available to registered users of the IET site; you will be prompted to log in or register (free of charge) if necessary in order to download it.

Contact Details and Archive...

Print this page | E-mail this page