Your browser is no longer supported

For the best possible experience using our website we recommend you upgrade to a newer version or another browser.

Your browser appears to have cookies disabled. For the best experience of this website, please enable cookies in your browser

We'll assume we have your consent to use cookies, for example so you won't need to log in each time you visit our site.
Learn more

IET launch technical briefing for smart buildings

Work to develop standards of good practice for protecting intellectual property and the design and operation of building systems has been launched by the Institution of Engineering and Technology (IET).

The IET’s technical briefing: the Resilience and Cyber Security of Technology in the Built Environment has been developed by industry experts with the support of the Centre for Protection of National Infrastructure (CPNI).

The document examines the issues in relation to the building’s life-cycle; from concept, through design, construction, fit-out and operation, to its eventual decommissioning and demolition.

IET cyber security expert Hugh Boyes said: “Our society is increasingly moving towards the creation of intelligent or smart buildings for economic and environmental reasons. 

“In an intelligent building a range of systems will be integrated to improve the efficiency of the building’s operations, particularly its utility consumption, and to improve the occupants’ enjoyment of the accommodation. 

“From a resilience perspective the additional complexity increases the risk of systems failure which could simply cause inconvenience or in some circumstances lead to serious injury or loss of life. In terms of cyber security there is increased risk of corruption or hackers interfering with the safe and secure operation and occupancy of the building.

“This technical briefing examines the different sources of threats across the building lifecycle from initial concept through to decommissioning. It considers potential threat agents that could cause or contribute to a cyber security incident and identifies some of the measures that may be appropriate to reduce the risks.”

Have your say

You must sign in to make a comment

Please remember that the submission of any material is governed by our Terms and Conditions and by submitting material you confirm your agreement to these Terms and Conditions. Links may be included in your comments but HTML is not permitted.