The following 19 services & 5 features provided by the BACnet protocol offer significant
vulnerabilities to attack. This is how BACnet opens the door to various attacks.…
If your system is attacked what's the worst that can happen? How easy is it to cause? to stop? Cyber attacks can cause harm. The harm can be extreme such as when permanent damage is caused to equipmen…
First to market
Gives us pricing power
Can enter at low price to keep others out
Larger margin for initial period.
People stick with the product they know
Meet US Military Spec
Expensive, d…
Executive Summary
Industry and Company
What We Are Trying To Solve: Attacks on Non-Critical system components
How Can Attacks Cause Harm - What are we Protecting?
Why BACnet IP? BACnet IP Vulnerab…
Stop Data Communication Intruders In Their Tracks
If your investment / infrastructure is controlled or monitored using a system which uses a data communication protocol such as BACnet/IP then it is…
The problem of tiny markets: Windows 10.1 has over 200 million installs. That is over 200 million chances to observe and report bugs and vulnerabilities. You can also be sure that those 200 million us…
Bring large critical systems to their knees by attacking non-critical components
Fukushima Dai-ichi Nuclear Power Station
Failure = Backup diesel generators
Potential Catastrophe = Meltdown and Nucl…
Vulnerabilities are UbiquitousThere are thousands of vendors with tens of thousands of products. Each of which can have design flaws and vulnerabilities.Many products use underlying resources (like L…
Estimated Market Size - $95 Million
Sized the market using bottom-up approach - 2 methods - both yielded similar results.
Counting Deployed Devices. We build a list of potential customers categories s…