Attempts to Make Smart Cities Hit a Snag

Attempts to Make Smart Cities Hit a Snag

At this point, the concept of the Internet of Things is a fairly familiar one, but that familiarity is to the Internet of Things on the micro scale--appliances with capabilities enhanced by an available connection to the Internet. There is another, more macro application to the Internet of Things: as a way to collect data in a municipal setting. However, like the IoT we are familiar with, these “smart cities” are host to many familiar problems.

The Concept of a Smart City
Like many technological developments, the idea of a smart city is built on good intentions. Through the use of technology (much of it based in the IoT), a smart city leverages collected data to functionally serve the public, embetter the services of government, and improve the quality of life for its citizenry.

That’s the idea, at least.

Unfortunately, like many of the ‘smart’ devices that the populace can interact with, the systems that these cities leverage tend to be susceptible to attack.

What These Attacks Could Do
In order to understand the potential ramifications of these kinds of attacks, it is important to first have an understanding of the kinds of systems that a smart city is built upon.

The true purpose behind creating a smart city is to make it a better place to live, and to do that, certain systems need to be put in place. These systems are powered by the data they collect. With that data, insights into correlated problems can be leveraged to solve them.

The sensors that these cities use to collect this data monitor a wide variety of factors, ranging from traffic conditions to the weather and even health-related factors like air quality and radiation. The data that is collected is then used, through the power of automation, to decide how to approach infrastructural concerns. For instance, if traffic is moving slowly in an area, these systems would deliver that data to decision-makers, allowing them to make the call to reroute traffic a different way to ease the congestion. This system just makes the decisions, too.

The big problem with this is that now, if these systems don’t have sufficient security measures in place, they leave the city’s infrastructure vulnerable to attack. Unfortunately, in an initial study of three companies who provide these kinds of smart city systems, 17 basic vulnerabilities were present in their products. These vulnerabilities included things like easily guessable passwords, bugs that could allow malware to be introduced, and opportunities for authentication requirements to be side-stepped.

Why This Matters
The harsh reality is that developing smart cities with these kinds of vulnerabilities is the geopolitical equivalent of intentionally wearing a “Kick Me” sign each and every time you went out in public. The United States of America have already learned this the hard way, as electoral systems and the energy grid have been hijacked recently. If appearances aren’t deceiving, actions are being taken to reinforce these vulnerabilities in these IoT devices, but it certainly doesn’t help if careless oversights are being made in the security of major metropolitan areas.

We’re not saying that bringing the Internet of Things to cities is a bad thing, but the security needs to be there. The same goes for businesses. If your business relies on devices that connect to the Internet, like physical security devices, smart appliances, and networking infrastructure, locking down these devices and keeping them patched is critical to keep your operations running without a hitch.

Give Infracore LLC a call at (858) 509-1970 to learn about the security options we have to offer you.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, September 22 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business computing Google Network Security Hackers Malware Software Microsoft Innovation Internet Data Tech Term Smartphones Backup Hardware Email Hosted Solutions Windows 10 Android Business Mobile Devices Alert Small Business VoIP Business Continuity Managed IT Services Browser Cloud Computing Data Backup Computers Disaster Recovery Computer IT Services Smartphone Ransomware Outsourced IT Office Business Management User Tips Productivity Communications Law Enforcement Artificial Intelligence Miscellaneous Efficiency Cybercrime Windows Workplace Tips Data Recovery Network Internet of Things Communication Router Telephone Systems Managed IT Services Productivity Money Passwords Chrome Collaboration Cybersecurity How To Password Applications Virtualization Social Media Facebook Social Engineering Gadgets Work/Life Balance Saving Money Quick Tips App Upgrade Health Windows 10 Office 365 Connectivity Private Cloud Apps Phishing HaaS Google Drive Office Tips Word Automation IT Support Data Security Bring Your Own Device Server IT Support Save Money Data Protection Microsoft Office Holiday Vulnerability Hacking Spam Wi-Fi Two-factor Authentication Data Breach Mobile Device Management Big Data Redundancy Data Management Government IT Management Spam Blocking Avoiding Downtime Computer Care VPN Information Mobile Device Paperless Office Public Cloud IT Plan Marketing Operating System Electronic Medical Records Samsung Battery BDR Bandwidth Managed Service Training Virtual Assistant Entertainment Unsupported Software Comparison End of Support Remote Monitoring Website CES USB Value History Firewall Networking Managed IT Remote Computing Sports Windows 7 Flexibility Employer-Employee Relationship Content Management Keyboard Charger Settings Business Intelligence Patch Management Legal PDF BYOD Mobility Automobile Data Storage Blockchain Identity Theft Update Cleaning Encryption Scam OneNote Infrastructure Managed Service Provider Worker Cryptocurrency Audit Evernote Hiring/Firing Multi-Factor Security HIPAA Monitor Excel Techology Users Credit Cards Inventory Network Congestion Remote Worker Information Technology Criminal Music Servers Workforce Transportation Safety Tools Content Password Manager Politics Rootkit IT solutions Physical Security Books Assessment Safe Mode Computer Fan Sync Wireless Charging Devices Employer Employee Relationship Wireless Internet Search Trending Human Resources HVAC Tip of the week Virtual Reality Fraud Access Control Humor Internet Exlporer IT Consultant Wiring Data loss Instant Messaging Google Docs Wearable Technology Accountants Files Benefits Downtime Video Games Audiobook Business Mangement Machine Learning Staff Data storage Television The Internet of Things Cortana Thought Leadership Hybrid Cloud Computer Accessories Wire webinar How to Enterprise Content Management Windows 10s Windows Server 2008 Worker Commute Amazon Authentication Leadership Unified Threat Management Screen Mirroring Education Telecommuting MSP Root Cause Analysis Gmail Vendor Management YouTube HBO Specifications Emergency Public Computer Telephone System FENG Telephony Google Apps Apple Bluetooth Conferencing Software Tips Black Market Password Management Amazon Web Services Nanotechnology Internet exploMicrosoft Save Time Mobile Computing Cast Voice over Internet Protocol Troubleshooting Loyalty Outlook Computing Infrastructure Remote Work Practices Smart Technology Current Events File Sharing Botnet Scalability Recovery Recycling Digital Signature Skype Workers Addiction iPhone Smart Office Emails NIST Solid State Drive Flash Online Shopping Smart Tech Advertising Camera Wireless SaaS Frequently Asked Questions Hosted Computing Relocation User Error Two Factor Authentication Knowledge Augmented Reality Meetings Travel eWaste Experience Millennials Start Menu Best Practice Cache Risk Management Document Management Printers WiFi CrashOverride Twitter Thank You Company Culture Compliance Congratulations Managing Stress Regulation Webinar

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

AgustinMMontgomery MasterCard Wants Your Selfie, But it’s Not for What You Think it’s For
19 September 2018
You have to share this wonderful article about how to handle the mobile payments and speedypaper rev...
JohnSHarper Tip of the Week: Working from Google Home
18 September 2018
Sharing these type tips are very effective for the readers and working from Google home is no secret...
Jesse Icely Study Finds that 45% of Virtual Machines Would Run More Efficiently in the Cloud
13 September 2018
Study has been pivotal goal for the generations. It has been marked with https://www.rushmyessays.or...
Malcolm Curtis Why You’ll Want to Consider Hosted VoIP Telephony
11 September 2018
VoIP was a new technology that was launched in this country this was just amazing it need 5g to get ...
Nomlanga Leach Alert: 33.7 Millions Records Released to Public Due to Leak of Massive Marketing Database
08 September 2018
Marketing database was reveal this year by a hacker that was not good news this was happened many ti...