Part of the BRE Trust Protecting People, Property and the Planet Smart Buildings and Security: Developing a unified approach Will Lloyd BRE Global Limited,

Slides:



Advertisements
Similar presentations
Identify risks with mobile devices: Portable data storage Wireless connections 3 rd party applications Data integrity Data availability 2.
Advertisements

Woodland Hills School District Computer Network Acceptable Use Policy.
Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013 Connecting.
The Cable Guys Inc. Drew Leach Tom McLoughlin Philip Mauldin Bill Smith.
Presented by Serge Kpan LTEC Network Systems Administration 1.
Wireless Router Setup. Internet Cable Internet Cable (Blue) Machine Cable (Yellow) Power Plug (Black) Reset Button (Red)
Chapter 7 Securing your Wireless Network (WIFI). Synopsis What is a wireless home network? What damage can a wireless network snoop do? Who are the snoopers?
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
Making Smart Airports a Reality
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
Chapter 26 Communication Systems. Objectives After reading the chapter and reviewing the materials presented the students will be able to: Identify common.
XP 1 New Perspectives on Microsoft Windows XP, 2005 Service Pack 2 Update Appendix D Microsoft Windows XP, Service Pack 2 Update Appendix D – Setting Up.
PROTOCOLSSTANDARDSEQUIPMENTBLUETOOTH CELL PHONE DATA NETWORKS ADVANTAGES/ DISADVANTAGES GENERAL INFORMATION Main Menu.
C ONNECTING YOUR NETWORK National 4/5 Computing Science.
Information about the computer By Sophia and Christina C.
Network and WiFi By: Clara-Hannah S., Amelia H., and Margot d’I.
Wireless Networking 102.
Threats to I.T Internet security By Cameron Mundy.
Topic 6 – Wireless Technology and handheld devices 1)TechMed scenario covers The uses of wireless technologies and handheld devices In the scenario: “Some.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module E Network Basics.
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Wireless Networks This section Contain : 1) Wireless Basics. 2) Bluetooth. 3) Wi-Fi. 4) Wi-Fi Equipment. 5)Wi-Fi Setup.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Computer Concepts 2014 Chapter 5 Local Area Networks.
Security and Privacy in Smart Communities By: Dr. Tan Hanh, Dr. Hoang Xuan Dau Posts and Telecommunications Institute of Technology (PTIT), Hanoi, Vietnam.
OCR Cambridge National ICT Mr Conti 10X 25 th April 2014.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Ch 20. Computer Network Wireless Connections. Bluetooth3G MobileWiFi Speed3Mbit/s7.2Mbit/s54Mbit/s Coverage~10MCity – wide~50M CostFree$200 - $400 /monthFree.
Understanding Wireless Networking. WiFi Technology WiFi began as a way to extend home and small office network access without installing more cable. As.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
“ Getting to Know Networks”. What Is a Network? A network is a collection of computers hooked up together, usually by cables or telephone wires, for the.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
Setting Wireless Network At Home By: Parveen Sharma.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
WIRELESS NETWORKING Ramiah Qasem, Jahmia Algahmie, Andrew Speice.
Home Networking. The Smith Family This is the house the Smiths live in. Can you spot their digital devices?
Communications & Computer Networks Resource Notes - Network Hardware
Communications & Networks National 4 & 5 Computing Science.
NETWORKING & SYSTEM UPDATES
science/internet-intro
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Personal System Administration CS5493. SA SA is a Systems Administrator The SA is responsible for maintaining the overall wellbeing of a computing system.
Woodland Hills School District Computer Network Acceptable Use Policy.
Cybersecurity Test Review Introduction to Digital Technology.
Staying Safe Online Technology Services Organization.
There is a lot to talk about if we think of the advantages of a wireless connection, the most important of its aspects is mobility and everything that.
 Internet access is the process that enables individuals and organizations to connect to the Internet using computer terminals, computers, and mobile.
The Next Level Welcome Damien McCann
Networks Are you Wired?. Networking A network is defined as two or more computers connected together –Peer-to-peer when a server is not involved. –Client-server.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
MUHAMAD SHAZNI BIN MOHAMMAD SHAH. Gateway Using different protocols for interfacing network by network nodes Contain device such as protocol translator,
ICT Unit 4: Network and the effects of using them
Module Overview Overview of Wireless Networks Configure a Wireless Network.
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
U-PROX SMART HANDLE Fully incorporated Wireless Handle and Furniture Locking Set.
CS101 Home Network Basics.
Troubleshooting Networked Video
IoT security is a nightmare. But what is the real risk?
Configure Instruction
Security and Smart Home Devices: How Safe Is Your Home?
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Dial-up Dial-up internet is a form of internet access that uses the public telephone network (PSTN) to establish a connection to an ISP by dialing a telephone.
Morgan County Schools And Extreme Networks
Presentation transcript:

Part of the BRE Trust Protecting People, Property and the Planet Smart Buildings and Security: Developing a unified approach Will Lloyd BRE Global Limited, incorporating LPCB

What is a Smart building? Smarter buildings are well managed, integrated physical and digital infrastructures that provide optimal occupancy services in a reliable, cost effective, and sustainable manner. Are they really smart or just connected?

Wired or Wireless? Cables no longer king WI-FI is everywhere Low power wireless Are they all secure?

Smart buildings set to grow The interest in smart buildings is only growing The rate of integration is growing With more smart buildings comes more risk

Smart meters being installed now More devices are being produced More systems are being integrated The Growth of Smart devices

Connected Buildings Buildings are now connect to the internet This means everything is connect to the internet

A controller in everyone's hands Fast becoming the default interface for every system More computing power than men took to the moon Very low penetration of anti virus malware protection

The new key We use to have a separate key for each system Now its just an app Near Field Communication (NFC) is nothing new With Phones now using NFC this opens many more doors

Six degrees of separation The Intruder system wants to talk to the CCTV system The CCTV system wants to talk to the access control system The Access control system wants to talk to the Building Management System Which controls Lighting Heating Cooling Smart devices Which is all controlled and monitored by a smart phone

Security and Smart devices If everything is connected what is secure? The UK smart meter roll out aims to put a smart meter in every home by 2020 Nearly every home has Wi-Fi network

Smart fridges that send spam EE Bright box Guest WI-FI network security hole UPnP (Universal Plug and Play) Baby monitors hacked Security issues

Building Management & Control systems Older systems Not traditionally interconnected Now being connected for monitoring and control as part of sustainable and green buildings Little or no security

The Gatekeeper Your router is the first point of defence Your phone is now the key

How can you secure a Smart Building? Limit access to the network Physically Network encryption Change default passwords Do you really need everything connected Don’t broadcast yourself

What's next? The Internet of Thing’s (IoT) The connected car

Thank you for your attention Will Lloyd Product Development Manager – Electronic Security Loss Prevention Certification Board Any Questions