26.02.2020
How do security teams collaborate to understand threats to their building management systems?
More news about the topic
Could an unknown third party remotely manipulate your building’s heating systems? Could this cause physical damage to your premises or render them uninhabitable? What impact would this have on your business operation? What if the layout of your headquarters was available on the internet? Could this allow a well-informed intrusion? These scenarios may appear far-fetched, yet they are real-world examples of when Building Management Systems (BMS) have been compromised. They demonstrate how the boundary between physical security and cyber security is becoming increasingly blurred.
Read full article about the research of Emma Boakes at CREST
Ein Service des deutschen Präventionstages.
www.praeventionstag.de
www.praeventionstag.de