StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Intelligent Building and Security Manager - Term Paper Example

Cite this document
Summary
"Intelligent Building and Security Manager" paper defines intelligent building, highlights some benefits of intelligent building, and discusses the role, threats, and other responsibilities of security managers in fulfilling their specified expectations. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.4% of users find it useful

Extract of sample "Intelligent Building and Security Manager"

Intelligent Building and Security Manager Name Course Name and Code Date Table of Contents Table of Contents 2 Introduction 3 Definition of Intelligent Building 3 Benefits of Intelligent Buildings 4 Intelligent Building Threats 4 Approach in Securing Intelligent Buildings 9 Conclusion 12 References 14 Introduction The economic and environmental pressures have continued to require methods and strategies that are cost effective and efficient. In such approach, the operational and cost of ownership is reduced when it comes to public and commercial buildings. Some of the benefits associated with intelligent buildings include improving user productivity, secure and safe environment, maintaining a comfortable environment, reduction of costs associated with changing configuration and occupancy and energy saving (Kolokotsa et al., 2011; Yan et al., 2012). It is also imperative to understand the world employs technology and IT system to fulfill the requirements of intelligent building, and the use of technology has become a risky business across the world. The intelligent buildings are complex in nature and it is important to acknowledge safety and security requirements of the building stakeholders such as buildings’ users (Kolokotsa et al., 2011; Yan et al., 2012). The paper defines intelligent building, highlights some benefits of intelligent building and discusses the role, threats, and other responsibilities of security managers in fulfilling their specified expectations. Definition of Intelligent Building The definition of intelligent building across the world is different, but the standard component that is common in these definitions is the integration of technologies (Corno & Razzak, 2012). To fulfill the requirements of this paper, the definition of an intelligent building is a building with a combined technologies, which are interconnected and it supports the requirements of the building’s users (Yang & Wang, 2013). It enables easier reconfiguration of the space based on the requirements of users and enables efficiency during operations (Labeodan et al., 2015). Some of the components that make up an intelligent building include communication rooms, server rooms, data rooms, plant rooms, wireless, IP network, structured cabling and sensors (He et al., 2012). Benefits of Intelligent Buildings From the perspective of information technology, integration of systems results in commercial advantage (GhaffarianHoseini et al., 2013). Convergence of the technologies allows efficiencies in operational that are due to the integration of systems resulting in the management of operation systems, the space, and the built environment (Corno & Razzak, 2012). The convergence of the infrastructure is possible through the use of IP-based technologies such as the building management systems, which enables acquisition of information and control of the information (De Paola et al., 2012). For example, CCTV systems have become more IP-based irrespective of the data transport layers or physical layers; Yan et al., 2012. The use of such technologies is important because it allows efficient and effective management of workplace in return reduces the cost of recognition and flexibility in space (He et al., 2012). In addition, the self-service provision of such infrastructure enables employees to operate from one location without the requirement of physically moving from one location to the next (Labeodan et al., 2015). It also enables reconfiguration of security systems and access control based on the frequent changes associated with multiple occupancies (Liu et al., 2012). Intelligent Building Threats Intelligent buildings are prone to numerous risks (GhaffarianHoseini et al., 2013). The convergence of infrastructure and integration of business systems and building systems pose numerous risks that can be viewed from the aspects of operations, technology, and personnel (Marinakis et al., 2013). The greatest risk when it comes to intelligent buildings is the human elements (GhaffarianHoseini et al., 2013). Whether accidentally or deliberately, humans may sometimes seek means to bypass security control or incorrectly use available information to operate the systems. Integration of information systems and infrastructural components in an intelligent building increases the chances of omission or errors (Corno & Razzak, 2012). The integration of systems may result in a situation in which different facilities and IT management teams come together from different reporting chains, cultures, and priorities. These numerous characteristics prevent an effective response when it comes to faults or incidents (De Paola et al., 2012). From the perspective of technology, integration may contribute to the introduction of new failure modes and result in the building intelligence interfering with business operations and vice versa (Corno & Razzak, 2012). For example, it is easier for normal office computers to be updated when it comes to the latest antivirus software and the security of the computer and information contained safe. However, it is a challenge when it comes to business management systems or computers that are required to manage safety critical systems (Labeodan et al., 2015). Such weaknesses results in potential vulnerabilities that originate from malware that is introduced from infected media or even over the network (De Paola et al., 2012). Therefore, taking care of large intelligent systems are demanding because of the impact it can have on the entire infrastructure and also the resources that are required to accomplish the activity (Kolokotsa et al., 2011; Yan et al., 2012). For example, it is easier to manage small systems such as computers but it is a different thing when it comes to systems that are integrated into a building. Hence, the stakeholders should understand the threats and devise measures to address these challenges (Kolokotsa et al., 2011; Yan et al., 2012). Utilization of IP-based technologies allows operation savings because of the central nature, monitoring stations and outsourcing control (GhaffarianHoseini et al., 2013). However, the benefits may be overshadowed because the local control and knowledge is given to a third party (Corno & Razzak, 2012). The problem even becomes worse when the support personnel are requested to address a problem. The support personnel may lack the familiarity when it comes to operation and layout of the individual buildings (He et al., 2012). Giving the control to third parties means that actual control cannot be managed by the security personnel of the facility (Corno & Razzak, 2012; Yan et al., 2012). It should be understood that intelligent buildings employ technology when compared to traditional buildings that use steel and mortar to fulfill its obligations (GhaffarianHoseini et al., 2013). It is easier for the third parties to manipulate the control of an intelligent building when compared to traditional types of building. Hence, the change requires the building administrators and the security management including the managers manage the building according to strategies that protect the building against third parties ulterior motives (GhaffarianHoseini et al., 2013). From the perspective of security, numerous functions should be guaranteed (GhaffarianHoseini et al., 2013). For example, continuity of operations, maintenance of the integrity of operations and building, privacy and security of building’s users and owners (Kolokotsa et al., 2011; Yan et al., 2012). It is imperative to guarantee security to the requirements of the users and owners to enable these stakeholders to accomplish their respective obligations and objectives (De Paola et al., 2012; Labeodan et al., 2015). The intelligent buildings depend on information technology based resources to accomplish its daily activities. However, it should be understood that security issues may arise at any time and the management of the facility should understand this important requirement (Kolokotsa et al., 2011; Yan et al., 2012). For example, an intruder can jam the systems meaning that any business or personal activity cannot take place. It is important for the security manager to determine the appropriate approach to address the problem and ensure the activities continue while the problem is addressed (Corno & Razzak, 2012; Yan et al., 2012). It can be achieved through creating a contingency plan that addresses any problem that can arise. The privacy and security of the intelligent building’s owners and occupants may be compromised easily when integration of systems and convergence of the technical infrastructure creates additional issues (Corno & Razzak, 2012; Yan et al., 2012). For example, the convergence of the technical infrastructure may result in unauthorized access to data loss or systems loss, unauthorized pathways or unplanned pathways (Kolokotsa et al., 2011). For instance, unauthorized access to the building’s room booking and control systems may result in revealing personal data. The personal data may be in the form of visiting VIP or even when the resident is away (He et al., 2012; Labeodan et al., 2015). The intruder will just click a button and be able to access most of the information concerning the persons within the building, basic demographic about the people and other information that is the person in nature. Such information will be used to attack the privacy and confidential components of the building users. Hence, the security managers should understand such threats and determine the appropriate strategy that can be used to guarantee the security of the important rooms within the building. Furthermore, the integrity of the facility may be compromised if other parties are able to access to important building systems. For example, if other parties were able to take control or disable the building system, the situation may become worse when viewed from the perspective of the users and owners (Corno & Razzak, 2012; Yan et al., 2012). The entire facility may be declared unsafe resulting in numerous complications. The third parties may be natural in nature such as threats to the lives or health of the users or even a physical dame such as flooding or fire (De Paola et al., 2012; Labeodan et al., 2015). Disabling or compromising access control or security creates risks to the personnel and may result in the use of manual approaches to replace the requirements of the automated systems (Yang & Wang, 2013). The integrity in some of the facilities such as energy efficient buildings may be affected because of ineffective energy management functions due to the actions of third parties. Any disruption to the building may result in negating the benefits associated with advantages of intelligent buildings. The extent of the disruption would depend on the nature of the incident and the type of building (Corno & Razzak, 2012; Yan et al., 2012). For instance, the building management system main function may be to control the temperatures and prevent air from flowing beyond certain limits, any disturbance may result in a situation that makes the building inhospitable to the inhabitants, damage to some equipments because of temperature, or even cause additional problems to the stored materials. Furthermore, in the case of tall buildings, the buildings frequently use lifts and disruption may prevent effectiveness of the transportation systems inhibiting the transportation requirements within the building (Palensky & Dietrich, 2011; Yan et al., 2012). Approach in Securing Intelligent Buildings It is imperative to understand, intelligent buildings are prone to threats whether from within or from third parties (De Paola et al., 2012). The risks should be mitigated and managed effectively, and this can be achieved from four areas. The designers should be aware of changes that disruption may occur and should design the building in a manner that prevents such problems from occurrence (Kolokotsa et al., 2011). The designers should create mechanisms to mitigate and control such problems (Corno & Razzak, 2012). The building owners should determine the degree of systems integration and should determine its relative levels when incomes to commissioning, construction, designing and specification of the building (Kolokotsa et al., 2011; Yan et al., 2012). The building operators is another concern since their obligations and responsibilities are daily in nature (De Paola et al., 2012). The roles and responsibilities of each of the operators should be clarified and determined in advance (Silva et al., 2012). The building visitors and occupants should be informed of safe and correct operation of the building (He et al., 2012). The usage of facilities including access should be defined, and the occupants should be informed of threats and benefits of sustaining the systems (Yang & Wang, 2013). People (third parties, operators, owners, users) – the security manager in a facility should understand people in terms of users, owners, operators, and third parties are important in ensuring the facility fulfills its defined obligations and expectations (Corno & Razzak, 2012). The security manager should also appreciate the challenges that are associated with these groups (GhaffarianHoseini et al., 2013; Labeodan et al., 2015). These four parties should be analyzed, and their activities within the intelligent building documented well. For example, the owners should be updated regarding security measures, changes in security requirements and how the building can operate effectively (De Paola et al., 2012; Yan et al., 2012). The security managers are supposed to inform the owners or managements on strategies for improving the security of the users and other bodies involved in fulfillment of business initiatives (He et al., 2012; Labeodan et al., 2015). The users also should be informed about their limits and capacities in the building. The security manager is supposed to manage how the users can utilize resources and schedule it uses (GhaffarianHoseini et al., 2013). For example, the lifts and lighting system can be managed to ensure other users are not inconvenienced. In addition, the users can be informed regarding any changes and the appropriate action proposed to change the security of the building (Panda, Abraham & Patra, 2012). The security manager should determine access and who is allowed to other regions based on the existing agreements. The third parties such as technicians and other people should be informed about their limits (De Paola et al., 2012; Yan et al., 2012). The third parties should understand the requirements of the building and the expectations, and their respective roles in ensuring the building continue to operate effectively (He et al., 2012). Operations (Business and Technical) - the businesses and technical aspects of the intelligent building should be considered from the perspective of the security manager (Kolokotsa et al., 2011). The security manager should ensure businesses operate accordingly, and measures are in place to address any challenge that may occur (Yang & Wang, 2013). It means the security manager should have a preview of businesses activities relative to the demand for the resources (De Paola et al., 2012). The allocation of resources may be a role and responsibility to other players, but the role of the security manager cannot be avoided. Cooperativeness among the managers of the facility and the security manager should be involved because any decision is made (GhaffarianHoseini et al., 2013). Furthermore, the security manager should be able to manage the physical components of the technology (Corno & Razzak, 2012; Labeodan et al., 2015). The physical components include the cabling, lifts and other resources that facilities the operation of the intelligent building. The security manager involvement with other managers and employees is supposed to create mechanisms and frameworks that ensure these resources are secured (Kolokotsa et al., 2011; Yan et al., 2012). For example, creating a frequent auditing and reviewing system is important to ensure the resources operate accordingly and the presence of the resources (GhaffarianHoseini et al., 2013). The security manager is supposed to manage resources that are coming into the building and resources that are going out of the building. It ensures resources are not misused or stolen. These numerous approaches are aimed at ensuring the businesses and activities within the building continue to operate without disrupted. Systems (Technology) – the technology itself is important to fulfill the requirements of the building. The technology used in intelligent buildings comes in two forms: hardware and software (Nguyen & Aiello, 2013; Yan et al., 2012). The hardware parts includes the computers, servers and other physical components while the software is the applications and programs that allow coordination of the hardware systems (Corno & Razzak, 2012; Yan et al., 2012). The security manager is supposed to be aware of these resources and their locations within the facility. This can be achieved through effective record keeping that is frequently checked through auditing (GhaffarianHoseini et al., 2013). The software component can be accomplished through an effective relationship with the information technology department (Kolokotsa et al., 2011; Mardiyono, Suryanita & Adnan, 2012). It is imperative to note that an intelligent building is susceptible to numerous issues such as intrusion through the use of software (De Paola et al., 2012; Yan et al., 2012). Even though the security managers do not have the experience of technologically based requirements, an employee who understands the security measures of information technology should be involved to provide advice to the security manager to take appropriate security measure. Hence, the security manager should have a strong team of advisers to fulfill the requirements of intelligent building (GhaffarianHoseini et al., 2013; Yan et al., 2012). Conclusion In conclusion, the security managers play an important role in fulfilling the requirements of intelligent buildings. Intelligent buildings use technologies to accomplish assigned activities. For example, technologies can be used in the form of the air conditioner, information security systems, lifts and other important resources that are common nowadays. The shift as changed because the intruders or security challenge is not on a physical component such as a thief but the situation has changed resulting in intruders from other continents accessing the facilities and resources of intelligent building. In intelligent building, the important stakeholders are the users, owners, operators and the technology itself. The security manager should be in a position to ensure the activities within the intelligent building operate according to the proposed requirements. The security manager should be able to coordinate the different departments within the facility to ensure security is championed. For example, the cooperation between the security department and the information technology is important in addressing threats that are associated with the use technology. Moreover, the security manager interaction with the store keeping and procurements is crucial to understand the resources available, the location of the resources and the sensitivity of the resources. Therefore, the role of security manager when it comes to an intelligent building is different, and the security manager should be able to coordinate the different departments in ensuring security requirements are championed. References Corno, F., & Razzak, F. (2012). Intelligent energy optimization for user intelligible goals in smart home environments. Smart Grid, IEEE Transactions on, 3(4), 2128-2135. De Paola, A., Lo Re, G., Morana, M., & Ortolani, M. (2012, October). An intelligent system for energy efficiency in a complex of buildings. In Sustainable Internet and ICT for Sustainability (SustainIT), 2012 (pp. 1-5). IEEE. GhaffarianHoseini, A., Dahlan, N. D., Berardi, U., GhaffarianHoseini, A., & Makaremi, N. (2013). The essence of future smart houses: From embedding ICT to adapting to sustainability principles. Renewable and Sustainable Energy Reviews, 24, 593-607. He, D., Chen, C., Bu, J., Chan, S., Zhang, Y., & Guizani, M. (2012). Secure service provision in smart grid communications. Communications Magazine, IEEE, 50(8), 53-61. Kolokotsa, D., Rovas, D., Kosmatopoulos, E., & Kalaitzakis, K. (2011). A roadmap towards intelligent net zero-and positive-energy buildings. Solar Energy, 85(12), 3067-3084. Labeodan, T., Zeiler, W., Boxem, G., & Zhao, Y. (2015). Occupancy measurement in commercial office buildings for demand-driven control applications—A survey and detection system evaluation. Energy and Buildings, 93, 303-314. Liu, J., Xiao, Y., Li, S., Liang, W., & Chen, C. L. (2012). Cyber security and privacy issues in smart grids. Communications Surveys & Tutorials, IEEE, 14(4), 981-997. Mardiyono, M., Suryanita, R., & Adnan, A. (2012). Intelligent monitoring system on prediction of building damage index using the artificial neural network. TELKOMNIKA Indonesian Journal of Electrical Engineering, 10(1), 155-164. Marinakis, V., Doukas, H., Karakosta, C., & Psarras, J. (2013). An integrated system for buildings’ energy-efficient automation: Application in the tertiary sector. Applied Energy, 101, 6-14. Nguyen, T. A., & Aiello, M. (2013). Energy intelligent buildings based on user activity: A survey. Energy and Buildings, 56, 244-257. Palensky, P., & Dietrich, D. (2011). Demand side management: Demand response, intelligent energy systems, and smart loads. Industrial Informatics, IEEE Transactions on, 7(3), 381-388. Panda, M., Abraham, A., & Patra, M. R. (2012). A hybrid intelligent approach for network intrusion detection. Procedia Engineering, 30, 1-9. Silva, R. M., Arakaki, J., Junqueira, F., Santos Filho, D. J., & Miyagi, P. E. (2012). Modeling of active holonic control systems for intelligent buildings. Automation in Construction, 25, 20-33. Yan, Y., Qian, Y., Sharif, H., & Tipper, D. (2012). A survey on cyber security for smart grid communications. Communications Surveys & Tutorials, IEEE, 14(4), 998-1010. Yang, R., & Wang, L. (2013). Development of multi-agent system for building energy and comfort management based on occupant behaviors. Energy and Buildings, 56, 1-7. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Intelligent Building and Security Manager Term Paper, n.d.)
Intelligent Building and Security Manager Term Paper. https://studentshare.org/technology/2065477-intelligent-building-system-vulnerabilities
(Intelligent Building and Security Manager Term Paper)
Intelligent Building and Security Manager Term Paper. https://studentshare.org/technology/2065477-intelligent-building-system-vulnerabilities.
“Intelligent Building and Security Manager Term Paper”. https://studentshare.org/technology/2065477-intelligent-building-system-vulnerabilities.
  • Cited: 0 times

CHECK THESE SAMPLES OF Intelligent Building and Security Manager

The Tenure of Dianne Feinstein as Mayor

Feinstein always considered the security of civilians to be on the forefront.... Name: Instructor: Course: Date: The tenure of Dianne Feinstein as Mayor Dianne Feinstein was born in San Francisco, California, June 22, 1933.... Her father was a Jewish physician, and her mother was Catholic Russian-America....
5 Pages (1250 words) Essay

Project Plan: HighTech Data Collection Company

In all, following are the controls that need implementation in the current organization setup (these controls cover the overall steps that the organization needs to take and doesn't focus solely on one specific department): Human resources will go through a new compensation information system program that will strictly monitor their work and compensation Finance department will now enact formal accounting procedures and payroll systems Branding activities and budgets will now be officially audited through the main finance system Project Managers would have to submit their project progress on weekly basis to the executive management and other team members would be putting their daily timesheets or work report to their designated line manager Clients will be billed 50% in advance because there have been incidents of credit locks in the recent past....
4 Pages (1000 words) Assignment

Project Specification for the Auditors

The author highlights the security plan to guarantee the exchange of information, B2B infrastructure, and transfer security as well.... Even though it's frequently intelligent to extend to five-year plan for IT security, new practical application and new risks are consistently rising....
8 Pages (2000 words) Essay

Sourcing and IT Systems

That is why security issues become increasingly important with the ever growing use of IT in business.... Of course, the main driving forces behind security developments are banks.... Modern security information systems include not only reactive but proactive measures as protection from perceived threats, such as surveillance, encryption, and...
3 Pages (750 words) Essay

Leading Organizations and Competing in a Global Flat World

As the world evolved, the market has slowly shifted from a seller's playground to a consumer-dominated turf.... The customer-king has become a reality, taking commercial competition to the next level.... His satisfaction is no longer a task of the sales department, but an organizational goal.... hellip; The rise of new generations brings a change also in the consumer's needs....
3 Pages (750 words) Essay

Emotional Intelligence as a Behavioral Model

With emotional intelligence alone, the manager is unable to show how much of the behavior of the engineers had been idiosyncratic and how much was culturally determined.... ndeed, when American students were asked to describe their ideal job after graduation, they attached more importance to earnings, advancements, security of employment and benefits, as opposed to their Dutch counterparts.... He further explains that emotional intelligence is necessary for building trust, solving problems with others, participating productively in a group and creating a sense of identity and efficacy....
2 Pages (500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us