Infracore LLC Blog

Attempts to Make Smart Cities Hit a Snag

Attempts to Make Smart Cities Hit a Snag

At this point, the concept of the Internet of Things is a fairly familiar one, but that familiarity is to the Internet of Things on the micro scale--appliances with capabilities enhanced by an available connection to the Internet. There is another, more macro application to the Internet of Things: as a way to collect data in a municipal setting. However, like the IoT we are familiar with, these “smart cities” are host to many familiar problems.

The Concept of a Smart City
Like many technological developments, the idea of a smart city is built on good intentions. Through the use of technology (much of it based in the IoT), a smart city leverages collected data to functionally serve the public, embetter the services of government, and improve the quality of life for its citizenry.

That’s the idea, at least.

Unfortunately, like many of the ‘smart’ devices that the populace can interact with, the systems that these cities leverage tend to be susceptible to attack.

What These Attacks Could Do
In order to understand the potential ramifications of these kinds of attacks, it is important to first have an understanding of the kinds of systems that a smart city is built upon.

The true purpose behind creating a smart city is to make it a better place to live, and to do that, certain systems need to be put in place. These systems are powered by the data they collect. With that data, insights into correlated problems can be leveraged to solve them.

The sensors that these cities use to collect this data monitor a wide variety of factors, ranging from traffic conditions to the weather and even health-related factors like air quality and radiation. The data that is collected is then used, through the power of automation, to decide how to approach infrastructural concerns. For instance, if traffic is moving slowly in an area, these systems would deliver that data to decision-makers, allowing them to make the call to reroute traffic a different way to ease the congestion. This system just makes the decisions, too.

The big problem with this is that now, if these systems don’t have sufficient security measures in place, they leave the city’s infrastructure vulnerable to attack. Unfortunately, in an initial study of three companies who provide these kinds of smart city systems, 17 basic vulnerabilities were present in their products. These vulnerabilities included things like easily guessable passwords, bugs that could allow malware to be introduced, and opportunities for authentication requirements to be side-stepped.

Why This Matters
The harsh reality is that developing smart cities with these kinds of vulnerabilities is the geopolitical equivalent of intentionally wearing a “Kick Me” sign each and every time you went out in public. The United States of America have already learned this the hard way, as electoral systems and the energy grid have been hijacked recently. If appearances aren’t deceiving, actions are being taken to reinforce these vulnerabilities in these IoT devices, but it certainly doesn’t help if careless oversights are being made in the security of major metropolitan areas.

We’re not saying that bringing the Internet of Things to cities is a bad thing, but the security needs to be there. The same goes for businesses. If your business relies on devices that connect to the Internet, like physical security devices, smart appliances, and networking infrastructure, locking down these devices and keeping them patched is critical to keep your operations running without a hitch.

Give Infracore LLC a call at (858) 509-1970 to learn about the security options we have to offer you.

Hackers Plus Artificial Intelligence Equals Big Tr...
Tip of the Week: Set Your System up with the Apps ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, April 26 2019

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business computing Google Network Security Hosted Solutions Productivity Microsoft Internet Malware Software User Tips Data Innovation Hackers Smartphones Hardware Business Email Mobile Devices Backup Tech Term Workplace Tips Efficiency Communications VoIP Business Continuity Smartphone Data Backup Browser Business Management Windows 10 Android IT Services Small Business Cloud Computing Computer Disaster Recovery Outsourced IT Managed IT Services Alert Data Recovery Communication Ransomware Windows 10 Miscellaneous Chrome Office Network Managed IT Services Artificial Intelligence Router Computers Law Enforcement Cybercrime Collaboration Cybersecurity Windows Internet of Things Mobile Device IT Support Social Media Gadgets Telephone Systems Quick Tips Holiday How To Office 365 Password Applications Productivity Facebook Virtualization Money Health Passwords Server App Google Drive Spam Automation Saving Money Wi-Fi Upgrade Information Phishing Word Work/Life Balance Private Cloud Social Engineering Voice over Internet Protocol Training Vulnerability Settings Bring Your Own Device Microsoft Office Hacking Save Money Two-factor Authentication Mobile Device Management Encryption Mobility Keyboard Connectivity Paperless Office Operating System Apps Scam Data Breach Data Security BDR Managed Service HaaS Office Tips Data Protection IT Support Remote Computing Content Management Public Cloud Windows 7 Education Bandwidth Entertainment Software as a Service Botnet BYOD Business Intelligence USB Value Flexibility Blockchain Firewall Networking Data Storage Update End of Support Identity Theft Augmented Reality Meetings Legal History Wireless OneNote Automobile Infrastructure Save Time Employer-Employee Relationship Charger Cryptocurrency Redundancy IT Management Servers Spam Blocking Patch Management Avoiding Downtime VPN Data Management IT Plan Human Resources Cleaning PDF Users Google Docs Worker Fraud Access Control Machine Learning Marketing Big Data Unsupported Software Comparison Staff Computer Care Virtual Assistant Managed Service Provider Website CES Display Government Battery Remote Monitoring Managed IT Samsung Telephone System Telephony Electronic Medical Records Sports Password Management Security Cameras Amazon Web Services Nanotechnology Benefits Mobile Computing Cast Computer Accessories Humor Internet Exlporer Outlook Black Market Remote Work Practices Television File Sharing Business Technology Recovery Recycling Smart Office Administrator Emails Files Digital Signature Proactive IT Skype Workers Addiction Leadership Scalability Vendor Management NIST Hacker Solid State Drive Hybrid Cloud Flash Computing Infrastructure Online Shopping Smart Tech Camera Data storage eWaste Bluetooth Shortcuts Frequently Asked Questions Hosted Computing Emergency Public Computer Biometric Security Travel Document Management Microchip Millennials Troubleshooting Loyalty Net Neutrality Start Menu Cache Multi-Factor Security HIPAA Smartwatch Apple Audit Evernote Smart Technology Current Events WiFi Criminal Social Internet exploMicrosoft Excel Credit Cards Inventory Remote Worker 5G Best Practice Search Engine IT solutions Physical Security Workforce SaaS ISP Tools Password Manager Information Technology Trending Experience Safe Mode Employee iPhone Computer Fan Sync Techology Wireless Charging Devices Two Factor Authentication Knowledge Wireless Internet Warranty Risk Management HVAC Vendor Advertising Tip of the week Wiring OLED Data loss Content Bing Relocation User Error Search Accountants Cryptomining Downtime Business Mangement Hiring/Firing webinar Instant Messaging Music Digital Signage The Internet of Things Virtual Reality Cortana Thought Leadership Network Congestion Wire Printer Audiobook Politics Rootkit Enterprise Content Management Windows 10s Windows Server 2008 Amazon Authentication Transportation Safety Unified Threat Management Monitor Screen Mirroring Video Games Employer Employee Relationship YouTube Help Desk HBO How to Telecommuting Books Assessment MSP Database Root Cause Analysis Gmail Mouse Conferencing Software Tips Specifications Wearable Technology Google Search FENG Worker Commute Google Apps IT Consultant Company Culture Compliance Managing Stress Webinar Regulation Printers Thank You CrashOverride Congratulations Manufacturing Twitter

Recent Comments

NoahAnton Cryptomining is Inspiring Cybercrime
25 April 2019
The growth stock is actually the Cryptomining which increases in capital value instead of yield in h...
Sara George Tip of the Week: Locating a Misplaced Smartphone
16 April 2019
If you’re smart phone will be missed then with the software of the tracking location has to find the...
Jenna Ray What Star Wars can Teach About Mentorship
15 April 2019
There are lots of things in this world from we can learn positivity and people of this era are to ad...
Henry Lasseter What Volkswagen is Doing to Prevent Hackers From Controlling Your Car
09 April 2019
Volkswagen was doing to prevent hackers for from controlling your car it was done by the hackers. I ...
Hunter Gill Essential Cybersecurity Tips From The FBI
09 April 2019
FBI is the federal agency of the investigation the firm which investigates the cases of severe term ...