Cybersecurity Vulnerabilities in Off-Site Construction
Abstract
:1. Introduction
2. Cyber-Threats
2.1. Forms of Attack
2.1.1. Viruses
2.1.2. Worms
2.1.3. Trojan Horse
2.1.4. Spyware
2.2. Past and Present Threats
3. Importance of Cybersecurity in Manufacturing and Construction
3.1. Manufacturing
- Processing of data for predictive maintenance and remote monitoring.
- Enhancing service delivery and product quality.
- Exchange of information among devices belonging to factories, contractors, and customers.
- Mechanization and reduction of supplies.
- Acquisition and storage of data for digital performance management.
3.2. Off-Site Construction
4. Targetable Entities and Vulnerabilities
4.1. Primary Production
4.1.1. Prefabricated Module Production and Preparation
- Retrieve data information model (DIM).
- Target data source search.
- Filter data.
4.1.2. Transportation Design and Planning
4.1.3. Onsite Assembly
5. Cybersecurity Frameworks and Management
5.1. Cybersecurity Management Framework for Cloud-Based BIM Model
- Access management.
- Information protection.
- Governance approach.
- Security practices and policies.
- Protected collaboration in BIM–cloud integration.
5.1.1. Access Management
5.1.2. Information Protection
5.1.3. Governance Approach
5.1.4. Security Practices and Policies
5.1.5. Protected Collaboration in BIM—Cloud Integration
5.2. National Institute of Standards and Technology Framework
5.3. Security-Minded BIM in PAS 1192-5 and ISO 19650-5
- Official Secrets Act 1989.
- Computer Misuse Act 1990.
- Data Protection Act 1998.
- Environmental Information Regulation 2004.
- Freedom of Information Act 2000.
- Government Security Classifications.
5.4. The Institute of Engineering Technology (IET) Code of Practice for Cybersecurity in the Built Environment (Cop-CSBE)
5.5. Core Cybersecurity Framework for Construction
5.6. Management
5.6.1. Chained and Extremely Decentralized
5.6.2. Chained and Marginally Decentralized
5.6.3. Unchained
6. The Future of OSC
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Mullet, V.; Sondi, P.; Ramat, E. A Review of Cybersecurity Guidelines for Manufacturing Factories in Industry 4.0. IEEE Access 2021, 9, 23235–23263. [Google Scholar] [CrossRef]
- Bai, C.; Dallasega, P.; Orzes, G.; Sarkis, J. Industry 4.0 technologies assessment: A sustainability perspective. Int. J. Prod. Econ. 2020, 229, 107776. [Google Scholar] [CrossRef]
- Kebande, V.R. Industrial internet of things (IIoT) forensics: The forgotten concept in the race towards industry 4.0. Forensic Sci. Int. Rep. 2022, 5, 100257. [Google Scholar] [CrossRef]
- Zabidin, N.S.; Belayutham, S.; Ibrahim, K.I. A bibliometric and scientometric mapping of Industry 4.0 in construction. J. Inf. Technol. Constr. 2020, 25, 287–307. [Google Scholar] [CrossRef]
- Kozlovska, M.; Klosova, D.; Strukova, Z. Impact of Industry 4.0 Platform on the Formation of Construction 4.0 Concept: A Literature Review. Sustainability 2021, 13, 2683. [Google Scholar] [CrossRef]
- Oesterreich, T.D.; Teuteberg, F. Understanding the implications of digitisation and automation in the context of Industry 4.0: A triangulation approach and elements of a research agenda for the construction industry. Comput. Ind. 2016, 83, 121–139. [Google Scholar] [CrossRef]
- Ani, U.P.D.; He, H.; Tiwari, A. Review of cybersecurity issues in industrial critical infrastructure: Manufacturing in perspective. J. Cyber Secur. Technol. 2016, 1, 32–74. [Google Scholar] [CrossRef] [Green Version]
- Mantha, B.R.; de Soto, B.G. Cyber Security Challenges and Vulnerability Assessment in the Construction Industry. In Proceedings of the Creative Construction Conference, Budapest, Hungary, 29 June–2 July 2019. [Google Scholar] [CrossRef] [Green Version]
- Maskuriy, R.; Selamat, A.; Maresova, P.; Krejcar, O. Olalekan Industry 4.0 for the Construction Industry: Review of Management Perspective. Economies 2019, 7, 68. [Google Scholar] [CrossRef] [Green Version]
- Wójcicki, K.; Biegańska, M.; Paliwoda, B.; Górna, J. Internet of Things in Industry: Research Profiling, Application, Challenges and Opportunities—A Review. Energies 2022, 15, 1806. [Google Scholar] [CrossRef]
- Hughes, L.A.; Delone, G.J. Viruses, Worms, and Trojan Horses: Serious Crimes, Nuisance, or Both? Soc. Sci. Comput. Rev. 2007, 25, 78–98. [Google Scholar] [CrossRef]
- Senjo, S.R. A Review Of “Robert W. Taylor, Tory J. Caeti, D. Kall Loper, Eric J. Fritsch, and John Liederbach, Digital Crime and Digital Terrorism”; Studies in Conflict & Terrorism; Pearson/Prentice Hall: Upper Saddle River, NJ, USA, 2007; Volume 30, pp. 367–370, 397. [Google Scholar] [CrossRef]
- Spencer, H.; Wang, W.; Sun, R.; Xue, M. Dissecting Malware in the Wild. In Proceedings of the Australasian Computer Science Week, Brisbane, Australia, 21 March 2022. [Google Scholar] [CrossRef]
- Akinde, O.K.; Ilori, A.O.; Afolayan, A.O.; Adewuyi, O.B. Review of Computer Malware: Detection and Preventive Strategies. Int. J. Comput. Sci. Inf. Secur. (IJCSIS) 2021, 19, 49. [Google Scholar] [CrossRef]
- Amin, M. A Survey of Financial Losses Due to Malware. In Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, Udaipur, India, 4 March 2016. [Google Scholar] [CrossRef]
- Hansen, R.L. The Computer Virus Eradication Act of 1989: The War against Computer Crime Continues Comment. Softw. LJ 1989, 3, 717–754. [Google Scholar]
- Matkeviciene, R. Review: Cybercrime-Vandalising Information Society. Available online: http://informationr.net/ir/reviews/revs053.html (accessed on 29 March 2022).
- Kamal, S.U.M.; Ali, R.J.A.; Alani, H.K.; Abdulmajed, E.S. Survey and brief history on malware in network security case study: Viruses, worms and bots. ARPN J. Eng. Appl. Sci. 2016, 11, 16. [Google Scholar]
- Energy.gov, Colonial Pipeline Cyber Incident’. Available online: https://www.energy.gov/ceser/colonial-pipeline-cyber-incident (accessed on 8 April 2022).
- Conti Ransomware|CISA’. Available online: https://www.cisa.gov/uscert/ncas/alerts/aa21-265a (accessed on 8 April 2022).
- Machado, T.J.X.; Gouveia, L.B. Covid-19 effects on cybersecurity issues. Int. J. Adv. Eng. Res. Sci. 2021, 8, 222–229. [Google Scholar] [CrossRef]
- Almeida, F.; Santos, J.D.; Monteiro, J.A. The Challenges and Opportunities in the Digitalization of Companies in a Post-COVID-19 World. IEEE Eng. Manag. Rev. 2020, 48, 97–103. [Google Scholar] [CrossRef]
- War in Europe: Increased Cyber Security risk|Ek.co’. Available online: https://www.ek.co/gb/publications/war-europe-increased-cyber-security-risk (accessed on 22 April 2022).
- CyberSecurity & Threat Intelligence Report 2021|Heimdal’, Heimdal Security Blog. 3 February. 2022. Available online: https://heimdalsecurity.com/blog/cybersecurity-threat-report/ (accessed on 29 March 2022).
- Hwang, B.-G.; Shan, M.; Looi, K.-Y. Key constraints and mitigation strategies for prefabricated prefinished volumetric construction. J. Clean. Prod. 2018, 183, 183–193. [Google Scholar] [CrossRef]
- Wang, M.; Wang, C.C.; Sepasgozar, S.; Zlatanova, S. A Systematic Review of Digital Technology Adoption in Off-Site Construction: Current Status and Future Direction towards Industry 4.0. Buildings 2020, 10, 204. [Google Scholar] [CrossRef]
- Alaloul, W.S.; Liew, M.S.; Zawawi, N.A.W.A.; Mohammed, B.S. Industry Revolution IR 4.0: Future Opportunities and Challenges in Construction Industry. MATEC Web Conf. 2018, 203, 02010. [Google Scholar] [CrossRef] [Green Version]
- Fenner, A.E.; Zoloedova, V.; Kibert, C.J. Conference Report 2017: State-of-the-Art of Modular Construction. In Proceedings of the Rinker School of Construction Management University of Florida, Gainesville, FL, USA, 28 October 2017. [Google Scholar] [CrossRef]
- Woodhead, R.; Stephenson, P.; Morrey, D. Digital construction: From point solutions to IoT ecosystem. Autom. Constr. 2018, 93, 35–46. [Google Scholar] [CrossRef] [Green Version]
- Pasco, J.; Lei, Z.; Aranas, C. Additive Manufacturing in Off-Site Construction: Review and Future Directions. Buildings 2022, 12, 53. [Google Scholar] [CrossRef]
- Han, D.; Yin, H.; Qu, M.; Zhu, J.; Wickes, A. Technical Analysis and Comparison of Formwork-Making Methods for Customized Prefabricated Buildings: 3D Printing and Conventional Methods. J. Archit. Eng. 2020, 26, 04020001. [Google Scholar] [CrossRef]
- Yang, H.; Chung, J.K.H.; Chen, Y.; Li, Y. The cost calculation method of construction 3D printing aligned with internet of things. EURASIP J. Wirel. Commun. Netw. 2018, 2018, 147. [Google Scholar] [CrossRef] [Green Version]
- Wells, L.J.; Camelio, J.A.; Williams, C.; White, J. Cyber-physical security challenges in manufacturing systems. Manuf. Lett. 2014, 2, 74–77. [Google Scholar] [CrossRef]
- Corallo, A.; Lazoi, M.; Lezzi, M.; Luperto, A. Cybersecurity awareness in the context of the Industrial Internet of Things: A systematic literature review. Comput. Ind. 2022, 137, 103614. [Google Scholar] [CrossRef]
- Zhong, R.Y.; Peng, Y.; Xue, F.; Fang, J.; Zou, W.; Luo, H.; Ng, S.T.; Lu, W.; Shen, G.Q.P.; Huang, G.Q. Prefabricated construction enabled by the Internet-of-Things. Autom. Constr. 2017, 76, 59–70. [Google Scholar] [CrossRef]
- Fisk, D. Cyber security, building automation, and the intelligent building. Intell. Build. Int. 2012, 4, 169–181. [Google Scholar] [CrossRef]
- Xu, G.; Li, M.; Chen, C.-H.; Wei, Y. Cloud asset-enabled integrated IoT platform for lean prefabricated construction. Autom. Constr. 2018, 93, 123–134. [Google Scholar] [CrossRef]
- Yaacoub, J.-P.A.; Salman, O.; Noura, H.N.; Kaaniche, N.; Chehab, A.; Malli, M. Cyber-physical systems security: Limitations, issues and future trends. Microprocess. Microsyst. 2020, 77, 103201. [Google Scholar] [CrossRef]
- Zhai, Y.; Chen, K.; Zhou, J.X.; Cao, J.; Lyu, Z.; Jin, X.; Shen, G.Q.; Lu, W.; Huang, G.Q. An Internet of Things-enabled BIM platform for modular integrated construction: A case study in Hong Kong. Adv. Eng. Inform. 2019, 42, 100997. [Google Scholar] [CrossRef]
- Niu, Y.; Lu, W.; Chen, K.; Huang, G.G.; Anumba, C.J. Smart Construction Objects. J. Comput. Civ. Eng. 2016, 30, 04015070. [Google Scholar] [CrossRef] [Green Version]
- Bécue, A.; Praça, I.; Gama, J. Artificial intelligence, cyber-threats and Industry 4.0: Challenges and opportunities. Artif. Intell. Rev. 2021, 54, 3849–3886. [Google Scholar] [CrossRef]
- Junior, M.L.; Filho, M.G. Variations of the kanban system: Literature review and classification. Int. J. Prod. Econ. 2010, 125, 13–21. [Google Scholar] [CrossRef]
- Wang, P.; Wu, P.; Wang, J.; Chi, H.-L.; Wang, X. A Critical Review of the Use of Virtual Reality in Construction Engineering Education and Training. Int. J. Environ. Res. Public Health 2018, 15, 1204. [Google Scholar] [CrossRef] [Green Version]
- Gries, S.; Hesenius, M.; Gruhn, V. Cascading Data Corruption: About Dependencies in Cyber-Physical Systems: Poster. In Proceedings of the 11th ACM International Conference on Distributed and Event-based Systems, Barcelona, Spain, 19–23 June 2017; pp. 345–346. [Google Scholar] [CrossRef]
- Chen, K.; Xu, G.; Xue, F.; Zhong, R.Y.; Liu, D.; Lu, W. A Physical Internet-enabled Building Information Modelling System for prefabricated construction. Int. J. Comput. Integr. Manuf. 2017, 31, 349–361. [Google Scholar] [CrossRef] [Green Version]
- Khan, R.; Khan, S.U.; Zaheer, R.; Khan, S. Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges. In Proceedings of the 2012 10th International Conference on Frontiers of Information Technology, Islamabad, Pakistan, 17–19 December 2012; pp. 257–260. [Google Scholar]
- Hu, W.; Oberg, J.; Barrientos, J.; Mu, D.; Kastner, R. Expanding Gate Level Information Flow Tracking for Multilevel Security. IEEE Embed. Syst. Lett. 2013, 5, 25–28. [Google Scholar] [CrossRef]
- Shi, L.; Krishnan, S.; Wen, S. Study Cybersecurity of Cyber Physical System in the Virtual Environment: A Survey and New Direction. In Proceedings of the Australasian Computer Science Week 2022, Brisbane, Australia, 14–18 February 2022; pp. 46–55. [Google Scholar] [CrossRef]
- Sarfaraz, A.; Jha, A.; Mondal, A.; Goswami, R.T. An Efficient Detection and Prevention Approach of Unknown Malicious Attack: A Novel Honeypot Approach; Lecture Notes on Data Engineering and Communications Technologies; Springer: Singapore, 2021; Volume 73, pp. 11–19. [Google Scholar] [CrossRef]
- Nagajayanthi, B. Decades of Internet of Things Towards Twenty-first Century: A Research-Based Introspective. Wirel. Pers. Commun. 2021, 123, 3661–3697. [Google Scholar] [CrossRef]
- Mutis, I.; Paramashivam, A. Cybersecurity Management Framework for a Cloud-Based BIM Model. In Advances in Informatics and Computing in Civil and Construction Engineering; Springer: Cham, Switzerland, 2019; Volume 125, pp. 325–333. [Google Scholar]
- Zhao, J. Design and Implementation of BIM Based Integrated Construction Management Platform in Cloud Environment. In The International Conference on Cyber Security Intelligence and Analytics; Springer: Cham, Switzerland, 2022; pp. 916–920. [Google Scholar] [CrossRef]
- Mahamadu, A.M.; Mahdjoubi, L.; Booth, C. Challenges to bim-cloud integration: Implication of Security Issues on Secure Collaboration. In Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom, Bristol, UK, 2–5 December 2013; Volume 2, pp. 209–214. [Google Scholar] [CrossRef]
- Ahmed, U.; Petri, I.; Rana, O.; Raza, I.; Hussain, S.A. Federating Cloud Systems for Collaborative Construction and Engineering. IEEE Access 2020, 8, 79908–79919. [Google Scholar] [CrossRef]
- Wong, J.; Wang, X.; Chair, W.; Li, H.; Chan, G.; Li, H. A review of cloud-based bim technology in the construction sector. J. Inf. Technol. Constr. 2014, 19, 281–291. [Google Scholar]
- NIST CSWP 04162018; Framework for Improving Critical Infrastructure Cybersecurity. Version 1.1; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2018. [CrossRef]
- Pender-Bey, G. The Parkerian Hexad; Information Security Program; Lewis University: Romeoville, IL, USA, 2019; p. 31. [Google Scholar]
- Reid, R.C.; Gilbert, A.H. Using the Parkerian Hexad to Introduce Security in an Information Literacy Class. In Proceedings of the 2010 Information Security Curriculum Development Conference, Kennesaw, GA, USA, 1–3 October 2010; pp. 45–47. [Google Scholar] [CrossRef]
- Carlson, T. Information Security Management: Understanding ISO 17799; Lucent Technologies World Services: New Providence, NJ, USA, 2001; p. 18. [Google Scholar]
- Çekin, E.; Seyis, S. BIM Execution Plan based on BS EN ISO 19650-1 and BS EN ISO 19650-2 Standards. In Proceedings of the 6th International Project and Construction Management Conference (e-IPCMC2020), Istanbul, Turkey, 12–14 November 2020; p. 10. [Google Scholar]
- Boyes, H. Resilience and Cyber Security of Technology in the Built Environment; Institution of Engineering and Technology: London, UK, 2013. [Google Scholar]
- Boyes, H.; Hallaq, B.; Cunningham, J.; Watson, T. The industrial internet of things (IIoT): An analysis framework. Comput. Ind. 2018, 101, 1–12. [Google Scholar] [CrossRef]
- Boyes, H. Security, Privacy, and the Built Environment. IT Prof. 2015, 17, 25–31. [Google Scholar] [CrossRef]
- Boyes, H. Code of Practice for Cyber Security in the Built Environment; Institution of Engineering and Technology: London, UK, 2014. [Google Scholar]
- Turk, Ž.; de Soto, B.G.; Mantha, B.R.; Maciel, A.; Georgescu, A. A systemic framework for addressing cybersecurity in construction. Autom. Constr. 2021, 133, 103988. [Google Scholar] [CrossRef]
- Gammack, J.; Hobbs, V.J.; Pigott, D. The Book of Informatics; Thomson: Toronto, ON, Canada, 2007. [Google Scholar]
- Tiwari, A.; Batra, U. Blockchain Enabled Reparations in Smart Buildings Cyber Physical System. Def. Sci. J. 2021, 71, 491–498. [Google Scholar] [CrossRef]
- Turk, Ž. Ten questions concerning building information modelling. Build. Environ. 2016, 107, 274–284. [Google Scholar] [CrossRef]
- Redmond, A.; Hore, A.; Alshawi, M.; West, R. Exploring how information exchanges can be enhanced through Cloud BIM. Autom. Constr. 2012, 24, 175–183. [Google Scholar] [CrossRef]
- Thomas, L.W.; McDaniel, J.B. Legal Issues Surrounding the Use of Digital Intellectual Property on Design and Construction Projects, No. 58; National Academies Press: Washingdon, DC, USA, 2013. [Google Scholar]
- Turk, Ž.; Klinc, R. Potentials of Blockchain Technology for Construction Management. Procedia Eng. 2017, 196, 638–645. [Google Scholar] [CrossRef]
- Ammous, S. Blockchain Technology: What Is It Good for? SSRN Scholarly Paper ID 2832751; Social Science Research Network: Rochester, NY, USA, 2016. [Google Scholar] [CrossRef] [Green Version]
- Chauhan, A.; Malviya, O.P.; Verma, M.; Mor, T.S. Blockchain and Scalability. In Proceedings of the 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), Lisbon, Portuga, 16–20 July 2018; pp. 122–128. [Google Scholar] [CrossRef]
- Kruglik, S.; Nazirkhanova, K.; Yanovich, Y. Challenges beyond blockchain: Scaling, oracles and privacy preserving. In Proceedings of the 2019 XVI International Symposium ‘Problems of Redundancy in Information and Control Systems’ (REDUNDANCY), Moscow, Russia, 21–25 October 2019; pp. 155–158. [Google Scholar] [CrossRef]
- CII-Planning for the Future with Modularization and Offsite Construction’. Available online: https://www.construction-institute.org/blog/2021/september-2021/planning-for-the-future-with-modularization-and-of (accessed on 29 March 2022).
- Xu, Z.; Wang, S.; Wang, E. Integration of BIM and Energy Consumption Modelling for Manufacturing Prefabricated Components: A Case Study in China. Adv. Civ. Eng. 2019, 2019, 1609523. [Google Scholar] [CrossRef]
- How the Pandemic Will Shape the Future of Off-Site Residential Construction; Professional Builder. 2021. Available online: https://www.probuilder.com/how-pandemic-will-shape-future-offsite-residential-construction (accessed on 29 March 2022).
- Stephenson, J. Modular Building Institute-The Voice of Commercial Modular Construction; Modular Building Institute: Charlottesville, VA, USA, 2021; Available online: https://www.modular.org/ (accessed on 29 March 2022).
- Reinventing Construction through a Productivity Revolution|McKinsey. Available online: https://www.mckinsey.com/business-functions/operations/our-insights/reinventing-construction-through-a-productivity-revolution (accessed on 29 March 2022).
- US EPA. Construction and Demolition Debris: Material-Specific Data. 12 September; 2017. Available online: https://www.epa.gov/facts-and-figures-about-materials-waste-and-recycling/construction-and-demolition-debris-material (accessed on 29 March 2022).
- Djuraskovic, O. Cyber Attack Statistics. 50+ Important Facts and Trends’; FirstSiteGuide. 2022. Available online: https://firstsiteguide.com/cyber-attack-stats/ (accessed on 29 March 2022).
Parameter | Manual Wood Formwork | CNC Formwork | Additively Manufactured Formwork |
---|---|---|---|
Application | All shell wall panels | All roof panels | Sample formwork of the shell wall panel |
Machine | CNC cutting machine, woodworking tools | CNC cutting and milling machine | BAAM system, CNC milling machine |
Material | Wood board, fiberboard, epoxy plaster | Rigid EPS foam, epoxy plaster | 20% carbon fiber with reinforced ABS polymer |
Accuracy | Low | Low | High |
Production Cost | Low | High | High |
Material waste | High | High | Low |
Stages | KPI | Before | After | Improvement (+) |
---|---|---|---|---|
Production | Paperwork. | 10–20 papers | ≤9 papers | 10% |
Production Time. | 8–10 days | <7 days | 12.50% | |
Emergency detecting. | 10–30 min | 3 min | 85% | |
Emergency response. | 7 days | 0.5 days | 92.80% | |
Transportation (time) | Scheduling time | 1 day | 1–2 h | 66.70% |
Driver idle time | 5–10 min | 2–3 min | 66.70% | |
Task realizing time | 5–10 min | 2–3 min | 66.70% | |
Transportation time | 3–4 h | 2–3 h | 28.60% | |
Assembly | Emergency detecting time | 5 min | 1 min | 80% |
4 day assembly cycle | 5–7 days | 4 days | 33.30% | |
6 day assembly cycle | 7–9 days | 6 days | 25% | |
Emergency detecting time | 10 min | 2 min | 80% | |
Module collection | 2 min | <1 min | 50% |
Element | Understanding of… | Sample Questions |
---|---|---|
People | Building system and human interaction (cause to effect). | Who requires access to system information? |
Recognition and understanding. | Training and needs of participants involved in the project lifecycle. | What levels of cybersecurity needs are present? |
Information and data. | Used information and data in the system. | What information and data are required for proper functioning of the system? |
Electromagnetic spectrum. | Communication channels within and outside the system. | To what extent are communications confined within the system? Is remote access a requirement? |
Building systems. | System location. | Is third-party access required? |
Infrastructure. | Utilities supply (energy, telecommunication, water, and piping). | What physical and electronic infrastructure is used to generate, retrieve, handle, and store data, including network communication components? |
Environmental factors. | Social, political, and legal factors relevant to the building and its system. | Should the information be analyzed, stored, and used within a single domain, or can it be accessed from another domain? |
Extended Parkerian Attributes | Core Cybersecurity Model |
---|---|
Utility, availability, resilience, and safety. | Not harming. |
Confidentiality and possession. | Not stealing. |
Integrity and authenticity. | Not lying. |
Information | Material | People | System Mechanism | System Boundary | |
---|---|---|---|---|---|
Stealing | Theft of information and assets. | Plain theft (indirect concern of cybersecurity). | Kidnapping (indirect concern of cybersecurity) | Plain theft. | Altering of system boundaries. |
Lying | Fabricating or misrepresenting information. | Counterfeit and defective products. | Falsification of identity. | System claiming to be the authentic one. (Trojan horse) | System claiming to be the authentic one. (Trojan horse) |
Harming | Corrupted information. | Physical damage to hardware and products (indirect concern of cybersecurity). | Hurting people (indirect concern of cybersecurity). | Altering the system by code or physically so that it malfunctions. | Creating loopholes on the boundary, disabling functionality. |
Stealing | Lying | Harming | |
---|---|---|---|
General construction information and databases. | Trespassing on intellectual property. | Falsifying information. | Withholding information. |
Design information | Stealing reusable information and IP for other projects. | Deliberately sharing wrong information. | Destroying and eliminating information. |
Bidding and costing information | Competitors attempting to obtain information on the level of pricing. | Deliberately sharing wrong information. | Destroying and eliminating information. |
Construction information. | Accessing competitor trade secrets. | Deliberately sharing wrong information. | Destroying and eliminating information. |
Stealing | Lying | Harming | |
---|---|---|---|
Authorities | Abduction. Identity theft. | Identity theft. Falsifying identity. | N/A |
Knowledge staff (technocrats) | Abduction. Identity theft. | Identity theft. Falsifying identity. | N/A |
Manual staff | N/A | Abduction. Identity theft. | Physical harm during interaction with machinery. |
Stealing | Lying | Harming Boundary | Harming Mechanism | |
---|---|---|---|---|
Legal person (operation, company, institution). | Change of ownership information. | Identity theft/Falsifying identity. | Contravening boundaries to access insider information. | Disrupting internal processes. |
Project virtual organization. | N/A | N/A | Contravening boundaries to access insider information. | Disrupting internal processes. |
System softwares. | Pirating software. | Malware software that acts as a Trojan horse. | Uncontrolled access. | Disruption of the system by injection of malware. |
OSC & construction site. | Stealing of design models. | Altering sensor data to give misleading information. | Uncontrolled site boundaries. | Operation of the value chain is disturbed by falsified information (software and hardware damage). |
Country | Documents Published | Citations | Average Citation | Total Link Strength |
---|---|---|---|---|
Mainland China | 47 | 623 | 13.3 | 3766 |
Canada | 18 | 93 | 5.2 | 4.94 |
Hong Kong | 17 | 487 | 28.6 | 2250 |
Australia | 15 | 81 | 5.4 | 1494 |
USA | 15 | 99 | 6.6 | 616 |
UK | 10 | 60 | 6 | 698 |
Singapore | 8 | 101 | 12.6 | 1211 |
Germany | 7 | 18 | 2.6 | 203 |
Brazil | 6 | 34 | 5.7 | 240 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Nyamuchiwa, K.; Lei, Z.; Aranas, C., Jr. Cybersecurity Vulnerabilities in Off-Site Construction. Appl. Sci. 2022, 12, 5037. https://doi.org/10.3390/app12105037
Nyamuchiwa K, Lei Z, Aranas C Jr. Cybersecurity Vulnerabilities in Off-Site Construction. Applied Sciences. 2022; 12(10):5037. https://doi.org/10.3390/app12105037
Chicago/Turabian StyleNyamuchiwa, Kudakwashe, Zhen Lei, and Clodualdo Aranas, Jr. 2022. "Cybersecurity Vulnerabilities in Off-Site Construction" Applied Sciences 12, no. 10: 5037. https://doi.org/10.3390/app12105037
APA StyleNyamuchiwa, K., Lei, Z., & Aranas, C., Jr. (2022). Cybersecurity Vulnerabilities in Off-Site Construction. Applied Sciences, 12(10), 5037. https://doi.org/10.3390/app12105037