2022
DOI: 10.3390/app12105037
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity Vulnerabilities in Off-Site Construction

Abstract: Industry 4.0 is seeking to advance traditional construction practices towards more efficient and internet of things (IoT)-based construction practices, such as offsite construction. Offsite construction (OSC) allows for the simultaneous fabrication of building modules and onsite work. Integrating IoT technologies in construction practice is projected to improve the industry’s growth. However, there is an increase in cybersecurity vulnerabilities. Cyber threats are becoming more disruptive and targeted, resulti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 60 publications
0
0
0
Order By: Relevance
“…This will encourage the organisation not to fear cyber risks and other human-related risks leading to stressful consequences such as exposing private workers and project information. In, addition DRM also protects the physical construction site, including the people working in it and data through the use of security cameras, security guards' agents, as well as locks (Nyamuchiwa et al, 2022).…”
Section: Construction Data Risks Managementmentioning
confidence: 99%
See 1 more Smart Citation
“…This will encourage the organisation not to fear cyber risks and other human-related risks leading to stressful consequences such as exposing private workers and project information. In, addition DRM also protects the physical construction site, including the people working in it and data through the use of security cameras, security guards' agents, as well as locks (Nyamuchiwa et al, 2022).…”
Section: Construction Data Risks Managementmentioning
confidence: 99%
“…This requires the use of closed-circuit television (CCTV), employment of security guards, data identification, locked file cabinets, data backup and control access through a strong password, which has to be updated more often. Also, the use of artificial intelligence (face recognition and fingerprint) with its fast fraud detection capabilities, as well as breach prediction will help to have continuous control of the system access (Nourani et al, 2022;Nyamuchiwa et al, 2022). Firewalls, encryption, virtual, antimalware and intrusion prevention systems are also used in data security (Staunton et al, 2021).…”
Section: Introductionmentioning
confidence: 99%