Breaking into BIM: Virtual red-teaming

0

Breaking into BIM FIGURE 1 imageBy Stuart Porter

A vulnerability assessment can be a costly and complex task to undertake. This cost can force stakeholders to limit the amount of security analysis they perform on a facility, often leaving the task until late in the construction phase for facilities where security isn’t considered vital. Late consideration can lead to costly re-design and retro fitting of security measures.

Our research aims to make vulnerability assessment more accessible and able to be applied from the early stages of facility design. To achieve this we looked at incorporating Building Information Models (BIMs) into security simulation software. BIMs are similar to traditional 3D CAD in that they allow for the 3D visual design and representation of a facility, with the abstraction of various plan views possible for construction purposes. The main advantage over CAD is that a BIM treats the objects within it as entities, linking them to a database back end. READ MORE

 

Share.

Comments are closed.