Cyber-Physical Systems for Buildings Management Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

Introduction

Today, integrating cyber-physical systems into utilities’ management becomes a common practice for various businesses. These novelties reveal the need to address the risks of devices and utilities being connected and run by vulnerable networks and programs. Indeed, Rehman and Gruhn (2018) claim that “security requirements frameworks fail to accommodate security concerns outside of software boundaries” (p. 65). This paper aims to explore threats, attacks, and vulnerabilities affecting cyber-physical systems’ functioning in building and utility management.

Cyber-physical systems are based on the software embed into a device that allows a computer to operate the latter; thus, each issue with the central administrator significantly affects all dependants. For instance, in 2016, the Mirai Botnet’s massive denial of service attack disrupted the internet functioning at the U.S. east coast (Fruhlinger, 2018). Hackers earned money from the interruption of game servers by setting the malware bots and infecting various controllable devices. The 2016 attack forced the FBI investigation, which revealed that the growing implementation of the IoT was beneficial for cybercrime due to the unsecured data storing and dependence on an external computer or system (Fruhlinger, 2018). Consequently, program developers worldwide were urged to identify vulnerabilities and work on them to prevent significant cybercrime from repeating.

Analysis

The IoT devices are used in buildings and utilities for security, lightning or ventilation automation, emergency safety measures, and other management applications. Although implementing these cyber-physical systems is economically beneficial, several risks of malware attacks or functioning disruption exist. The primary threat is the vulnerability of the devices’ software due to external administration. The issue must be addressed from both ends of the cyber-physical systems as an operator can be unsecured, and a device might have no software to recognize a threat and protect itself (Rehman & Gruhn, 2018). Furthermore, the Mirai cybercriminals initiated massive attacks because interrupting one general computer led to the malware botnets creation based on all dependant physical items.

Data collection and privacy protection is another vulnerability that affects cyber-physical systems’ functioning in the management of buildings and utilities. The process data gathered by the automated doors, CCTV in access points, and other IoT conveniences are being sent to the main operating unit to provide feedback and submit functioning. The algorithms of retrieving information keep improving, however, there is no clear policy related to the records allowed to store, neither a regulation about further utilization (Bakakeu et al., 2017). The data shared from the building management devices threatens citizens’ privacy and security as a significant volume of information about them is being digitalized might be accessed by hackers. Moreover, the networks that provide a connection between the cyber-physical system’s items are vulnerable. Walker-Roberts et al. (2020) state that “limited computation, communication, and processing resources of common CPS devices make the application of classical data encryption and secure communication protocols impractical” (p. 2645). Consequently, the networks can easily be attacked, re-programmed, or disabled by cybercriminals leading to massive problems with the affected devices.

Summary

Cyber-physical systems integration for managing buildings and facilities automates and improves many processes; however, the security of IoT appliances must be evaluated. The example of Mirai Botnet attacks uncovered vulnerabilities of the novel approach showing that interrupting servers not only can lead to financial losses but also severely affect business functioning. The fundamental threats such as software disruption, data misuse, and networks’ damaging require preventative measures’ development.

References

Bakakeu, J., Schäfer, F., Bauer, J., Michl, M., & Franke, J. (2017). Smart Cities: Foundations, Principles, and Applications, 605-639. Web.

Fruhlinger, J. (2018). CSO. Web.

Rehman, S. U., & Gruhn, V. (2018). Technologies, 6(3), 65. Web.

Walker-Roberts, S., Hammoudeh, M., Aldabbas, O., Aydin, M., & Dehghantanha, A. (2020). The Journal of Supercomputing, 76(4), 2643-2664. Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, October 16). Cyber-Physical Systems for Buildings Management. https://ivypanda.com/essays/cyber-physical-systems-for-buildings-management/

Work Cited

"Cyber-Physical Systems for Buildings Management." IvyPanda, 16 Oct. 2022, ivypanda.com/essays/cyber-physical-systems-for-buildings-management/.

References

IvyPanda. (2022) 'Cyber-Physical Systems for Buildings Management'. 16 October.

References

IvyPanda. 2022. "Cyber-Physical Systems for Buildings Management." October 16, 2022. https://ivypanda.com/essays/cyber-physical-systems-for-buildings-management/.

1. IvyPanda. "Cyber-Physical Systems for Buildings Management." October 16, 2022. https://ivypanda.com/essays/cyber-physical-systems-for-buildings-management/.


Bibliography


IvyPanda. "Cyber-Physical Systems for Buildings Management." October 16, 2022. https://ivypanda.com/essays/cyber-physical-systems-for-buildings-management/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1