BuildingCyberThreatLandscape Infographic

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

The Cyber Threat

Landscape in
Today’s Buildings
CYBERATTACKS AGAINST CRITICAL INFRASTRUCTURE ARE INCREASING EVERY YEAR.
An important piece of critical infrastructure that needs cybersecurity protection is our buildings. Most of
today’s commercial buildings are considered “smart” because of the high level of automation and
connectivity among the systems that manage functions like HVAC, physical security, lighting, energy, and
more. The graphic below shows some of the threat vectors within buildings and the potential
consequences of a successful cyber attack on each.

HUMAN Building Management


ACCESS Workstations Workstations CLOUD
POINTS

Network Switch

IP Camera Building Solar IoT Building Lighting


Controller Arrays Gateway Controller Bridge

NVR Uninterruptible EV Smart Motion


Power Supply Chargers Light Sensor
(UPS)
Badge Door Thermostat Fan
Reader Lock

Display Smart Sensor


Plug

VIDEO SURVELLIANCE ACCESS CONTROL CONNECTED HVAC SMART LIGHTING


SYSTEM SYSTEM DEVICES SYSTEM SYSTEM

Gaining access to a VSS is Access control systems are Energy systems are highly HVAC systems are a notorious To gain the energy saving
easier than you’d think notoriously lax on critical, especially for data threat vector because of the benefits of smart lighting,
because of the use of cybersecurity and easily centers and control rooms. highly publicized Target hack, these systems must be
insecure streaming protocols accessed from the internet. This heavily networked but the consequences of these connected to the internet,
and substantial cloud environment is often attacks can be far more serious and often, the cloud. This
connectivity. POTENTIAL IMPACTS OF A connected to the cloud, than stolen credit card data. connectivity opens up these
SUCCESSFUL ATTACK: making it an easy target for systems to cyber attacks.
POTENTIAL IMPACTS OF A attackers. POTENTIAL IMPACTS OF A
SUCCESSFUL ATTACK: • Locking employees or SUCCESSFUL ATTACK: POTENTIAL IMPACTS OF A
customers in or out of an POTENTIAL IMPACTS OF A SUCCESSFUL ATTACK:
• Tampering with video area via a DoS attack SUCCESSFUL ATTACK: • Tampering with the
footage to mask malicious (Denial of Control, Loss of temperature of a refrigerated • Turning off lights in a
activity (Denial of View, Control, Manipulation of • Operational downtime storage facility or data center critical area through a DoS
Loss of View, Control). resulting in product loss or attack (Loss of Availability,
Manipulation of View, • Emergency evacuation of network downtime (Loss of Loss of Control, Denial of
Damage to Property). • Compromise of other a building (Loss of Safety, Availability, Loss of Control, Manipulation of
operational systems or the Damage to Property, Loss Productivity and Revenue, Control).
• Compromise of other corporate network of Control, Denial of Damage to Property).
operational systems or the (Lateral Movement, Theft Control) • Compromise of other
corporate network of Operational • Emergency evacuation of a operational systems or the
(Lateral Movement, Theft Information). • Compromise of other building (Loss of Safety, corporate network
of Operational operational systems or the Damage to Property, Loss (Lateral Movement, Theft
Information). corporate network of Control, Denial of of Operational
(Lateral Movement, Theft Control) Information).
of Operational
Information). • Compromise of other
operational systems or the
corporate network (Lateral
Movement, Theft of
Operational Information).

Buildings need cybersecurity protection more than ever because of increased cyberattack activity by
everyone from hacktivists to nation states, combined with the fact that building management systems are
heavily networked, mission-critical, and often connected to the cloud. To learn more about how Industrial
Defender can help you keep all of these systems secure, visit our Building Defender™ page.

view building defenderTM page

© 2021 iDefender LLC All Rights Reserved

You might also like