C+S Fall 2024 Vol. 10 Issue 3 (web)

Tech & Innovation

• Data Protection. As mentioned, these lightweight devices sacrifice security measures so that sensors that support digital twins can be deployed en masse and send their data over the network. Depending on the environment in which they are deployed, an attractive solution for data transfer is to use a wireless communication protocol (e.g. wifi, bluetooth, etc.). It is well known, however, that these protocols are overtly susceptible to interception and manipulation. Understanding the vulnerabilities when using these methods for data transfer is essential for security. • Vulnerabilities of Legacy Systems. Many OT legacy systems were not designed for open, interconnected communication, including many of the existing sensors, actuators, and devices in the OT ecosystem. Connecting these devices directly or via an IoT device to a broader network has many operational advantages such as improved monitoring, remote access control, and fault detection, especially within the realm of digital twins. However, this interface between legacy systems and IoT devices presents several security challenges (e.g. network infiltration via the legacy system, DDoS on the sensor or IoT device, etc.) and may even introduce new vulnerabilities. Assessing the cyber risks associated with retrofitting such systems against their opportunity costs is an important consideration to manage the security concerns. An Example: Back to The Köhlbrand Bridge Before we begin, we must level-set on two fundamental concepts of cyber security: risk assessment and the CIA Triad. Risk assessment allows security practitioners to understand the criticality of systems and prioritize their mitigations, while aligning itself with the mission objective. In the case of the Köhlbrand Bridge, the mission objective of implementing a digital twin was to improve maintenance and while reducing delays—which has obvious safety and economic outcomes. The risk assessment compares the opportunity cost of the modeling capability vs the additional threat exposure of implementing such a digital twin system—which the leadership of the project deemed acceptable. During this risk assessment process, it is of the utmost importance to consider all the potential vulnerabilities introduced by such a system and prioritize their mitigations without severely inhibiting the benefits of the mission objective. However, in case of construction projects, which are often considered as critical infrastructure, this risk assessment must be scrutinized at the same level of the project’s catastrophic failure. In the case of the Köhlbrand Bridge, altered or improper sensor readings can lead to physical damage and/or injury— which is typically outside the digital sphere cyber-security.

The second concept—the CIA Triad—refers to the notion of maintaining Confidentiality, Integrity and Availability of these digital systems and goes hand-in-hand with cyber-risk assessment. When thinking about these in the context of the Köhlbrand Bridge digital twin and its criticality, several obvious questions become apparent: What are the implications of leaking the sensor data to a nefarious party? What if the sensor readings are altered or become inaccurate? How do we track and ensure the sensors remain operational? These questions spark a plethora of additional security conversations between SMEs, business leaders and security practitioners that ultimately lead to the prioritization of many cyber security controls and system architectures. These controls and design decisions are crucial in ensuring that maximal benefit is achieved from the digital twin while mitigating the additional risks they present. Manage, Detection, and Response (MDR) Adaptation With the unique security environment that comes with the promise of digital twin technology, adaptations need to be made to an AEC organization’s cybersecurity plan. A proactive approach to cybersecurity includes integrating security at every stage of a digital twin’s lifecycle. This includes a zero-trust security architecture, which grants minimal access to the data and verification of every request before granting use privileges. The best providers of Managed Detection and Response (MDR) services offer advanced detection, 24/7 threat hunting, deep investigation, and reliable, swift response. In other words, you should trust your MDR provider to detect attacks on your sensitive data and stop threats on your behalf before they disrupt your business - full stop. By addressing these challenges head-on, the built industry can unlock the full potential of digital twins while ensuring they remain secure and resilient in the face of evolving threats. Dr. Jeff Schwartzentruber holds the position of Sr. Machine Learning Scientist at eSentire–a Canadian cyber-security company specializing in Managed Detection and Response (MDR). Dr. Schwartzentruber’s primary academic and industry research has been concentrated in solving problems at the intersection of cyber-security and machine learning (ML).

21

Fall 2024

csengineermag.com

Made with FlippingBook Annual report