Feature
Onur Binay | Unsplash
so eliminates the need for the converter / translator boxes that brought different systems together to the BMS . Controllers having the ability to flatten the data themselves opened the door to communicate directly up to a supervisor software , or the viewing data platform ( BMS ).
A BMS then essentially became the ecosystem that contained all the information associated with connected aspects of the building and all the sub system parameters that could be monitored ( and controlled where applicable ).
Then came the announcement of the fourth industrial revolution and systems across the board started evolving as people wanted to be able to not only take information from a building management system , but they also wanted to be able to take information from multiple sources .
As these systems started maturing with the ability to take data from these multiple sources , the world started trending towards comparing data sets and this produced really great outcomes . These included aspects such as energy savings , system efficiency , understanding carbon footprints and even predictive actions based on for example the expected weather forecast in upcoming days . Monitoring of changing temperature conditions during the day also became possible .
With the addition of predictive algorithms for example , this would enable buildings to be pre-cooled or heated in anticipation of a cold front or heat wave respectively over the period . This however did , and still does , require accurate data inputs .
Today , through the internet of things ( IoT ) these BM systems can manage various processes and influence each other based on set criteria or occurrences . Also , the advancement of the use of cloud systems has further expanded a BMS ’ capability and participation in the bigger scheme of things . Now buildings themselves have become data points too . Here a new protocol has been developed known as MQTT – the standard for IoT messaging , which in a nutshell defines the rules of engagement between the cloud and any edge or disconnected device . This new protocol , and the technical specialists / skills to be able to incorporate it , has become a part of the growth and improvement of the built industry
Building management today can even be access from any smart device . that is known to be a large contributor in demand for heating and cooling and thus energy .
In South Africa currently there is a mixture of these systems where the old technology through JACE or EC BOS is installed and the newer technology , which already has IP capability and IoT functionality . The result though , is that all the data transferred ends up on the IP platform .
RISK AND SECURITY Having a building connected to the internet introduces an element of risk through exposure to security concerns that could be simple , such as someone accessing a system and fiddling with various comfort settings – or total system shutdowns . The importance of being aware of this factor should be right at the top of the list for a digital building strategy when you consider the total asset values in buildings being up to hundreds of millions to billions ( depending on the facility / activities ). This is known as security methodology .
To manage this risk there is a layer of hardware and encryption that can be added into the BMS level such as a TOSIBOX , which is a device that allows you to connect your internet connection ( that connects your building ) to the world . Anyone that want to connect into your building must have a specific encryption key to be able to access the BMS , and so this takes away the possibility that people can gain unauthorised access and mess around with the system .
Security risk today is a real situation that proves itself over and over as we have seen recently with the shutdown of the Transnet Port Terminals throughout the country . These situations may occur through simple frivolous activity , individuals or groups looking to make a buck , or in extreme cases where purposeful malicious damage is done . An example here is a recent breach of an automated manufacturing facility where access to the system was gained , a setting was changed by a mere half a degree on a particular component that resulted in a failure of an entire shift ’ s output when it came to the quality control point . Now although these situations are quite rare , they do exist and so security should be a priority .
The recent ‘ hack ’ at the state-owned Transnet , is an alarming reminder of how cyber security has elbowed its way near the top of the list of facility risks . The threat was serious enough to take the firm offline for over a week and to invoke the force majeure clause on its contracts .
Ransomware attacks are the fastest growing form of cybercrime in the world . They happen through the infiltration by malicious software of a computer or network . The aim is to limit or restrict access to critical data by encrypting files – effectively locking them – until a ransom is paid .
There is one ransomware attack every 11 seconds globally . That ’ s roughly each time you finish reading one of these paragraphs . The average downtime after each attack is 21 days . This depends on whether the ransom is paid or not . Ransoms are much maligned in public , but routinely paid in private cases .
26
RACA Journal I November 2021 www . hvacronline . co . za