Infracore LLC Blog

Attempts to Make Smart Cities Hit a Snag

Attempts to Make Smart Cities Hit a Snag

At this point, the concept of the Internet of Things is a fairly familiar one, but that familiarity is to the Internet of Things on the micro scale--appliances with capabilities enhanced by an available connection to the Internet. There is another, more macro application to the Internet of Things: as a way to collect data in a municipal setting. However, like the IoT we are familiar with, these “smart cities” are host to many familiar problems.

The Concept of a Smart City
Like many technological developments, the idea of a smart city is built on good intentions. Through the use of technology (much of it based in the IoT), a smart city leverages collected data to functionally serve the public, embetter the services of government, and improve the quality of life for its citizenry.

That’s the idea, at least.

Unfortunately, like many of the ‘smart’ devices that the populace can interact with, the systems that these cities leverage tend to be susceptible to attack.

What These Attacks Could Do
In order to understand the potential ramifications of these kinds of attacks, it is important to first have an understanding of the kinds of systems that a smart city is built upon.

The true purpose behind creating a smart city is to make it a better place to live, and to do that, certain systems need to be put in place. These systems are powered by the data they collect. With that data, insights into correlated problems can be leveraged to solve them.

The sensors that these cities use to collect this data monitor a wide variety of factors, ranging from traffic conditions to the weather and even health-related factors like air quality and radiation. The data that is collected is then used, through the power of automation, to decide how to approach infrastructural concerns. For instance, if traffic is moving slowly in an area, these systems would deliver that data to decision-makers, allowing them to make the call to reroute traffic a different way to ease the congestion. This system just makes the decisions, too.

The big problem with this is that now, if these systems don’t have sufficient security measures in place, they leave the city’s infrastructure vulnerable to attack. Unfortunately, in an initial study of three companies who provide these kinds of smart city systems, 17 basic vulnerabilities were present in their products. These vulnerabilities included things like easily guessable passwords, bugs that could allow malware to be introduced, and opportunities for authentication requirements to be side-stepped.

Why This Matters
The harsh reality is that developing smart cities with these kinds of vulnerabilities is the geopolitical equivalent of intentionally wearing a “Kick Me” sign each and every time you went out in public. The United States of America have already learned this the hard way, as electoral systems and the energy grid have been hijacked recently. If appearances aren’t deceiving, actions are being taken to reinforce these vulnerabilities in these IoT devices, but it certainly doesn’t help if careless oversights are being made in the security of major metropolitan areas.

We’re not saying that bringing the Internet of Things to cities is a bad thing, but the security needs to be there. The same goes for businesses. If your business relies on devices that connect to the Internet, like physical security devices, smart appliances, and networking infrastructure, locking down these devices and keeping them patched is critical to keep your operations running without a hitch.

Give Infracore LLC a call at (858) 509-1970 to learn about the security options we have to offer you.

Hackers Plus Artificial Intelligence Equals Big Tr...
Tip of the Week: Set Your System up with the Apps ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, January 18 2019

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business computing Google Network Security Malware Hosted Solutions Microsoft Data Hackers Innovation Software User Tips Hardware Business Tech Term Backup Internet Mobile Devices Smartphones Business Continuity Smartphone Email Data Backup Windows 10 Browser Productivity Computer VoIP Android IT Services Workplace Tips Small Business Communications Outsourced IT Data Recovery Managed IT Services Business Management Cloud Computing Disaster Recovery Alert Miscellaneous Artificial Intelligence Router Office Ransomware Efficiency Chrome Communication Computers Managed IT Services Network Windows 10 Cybercrime Law Enforcement How To Internet of Things Productivity Money Telephone Systems Passwords Holiday Office 365 Social Media Collaboration Cybersecurity IT Support Password Applications Facebook Virtualization Windows Google Drive Mobile Device Automation Saving Money Spam Quick Tips Work/Life Balance Upgrade Server App Health Wi-Fi Word Social Engineering Gadgets Information Connectivity Apps Vulnerability Managed Service Settings HaaS Office Tips Bring Your Own Device BDR Save Money Mobile Device Management IT Support Microsoft Office Hacking Data Protection Phishing Keyboard Voice over Internet Protocol Private Cloud Data Security Mobility Scam Data Breach Two-factor Authentication Encryption Infrastructure Computer Care Telephony Windows 7 Botnet Marketing Machine Learning VPN Electronic Medical Records End of Support BYOD Virtual Assistant Samsung Human Resources Bandwidth History Data Storage Battery Training Fraud Access Control Entertainment Google Docs OneNote Sports USB Telephone System Value Comparison Remote Computing Firewall Networking IT Management Redundancy Avoiding Downtime Software as a Service Spam Blocking PDF Website CES Employer-Employee Relationship Flexibility IT Plan Charger Legal Patch Management Managed Service Provider Operating System Content Management Government Automobile Business Intelligence Unsupported Software Cleaning Remote Monitoring Servers Worker Blockchain Managed IT Identity Theft Paperless Office Public Cloud Update Data Management Big Data Millennials Information Technology Wireless Internet Warranty Network Congestion Humor Conferencing Internet Exlporer Software Tips Cache Techology Users Music Safe Mode FENG HIPAA Content Transportation Wiring Safety Files Cast Evernote Politics HVAC Rootkit Vendor Multi-Factor Security Books Assessment Data storage Credit Cards Inventory Search Employer Employee Relationship Bing Hybrid Cloud Outlook WiFi Criminal Skype Workforce Instant Messaging Wire Printer IT Consultant Emails Password Manager Virtual Reality Wearable Technology Trending Video Games Audiobook Benefits Unified Threat Management Wireless Charging Devices Enterprise Content Management Display Solid State Drive Flash MSP Television Meetings Travel How to YouTube Computer Accessories Help Desk Apple Frequently Asked Questions Start Menu Accountants Mouse Leadership Internet exploMicrosoft Business Mangement Worker Commute Staff Mobile Computing Cortana Thought Leadership Education Password Management Vendor Management Security Cameras Audit Emergency File Sharing Public Computer Amazon Authentication Black Market Bluetooth iPhone Excel Tools Telecommuting Smart Office Save Time Administrator IT solutions Advertising Physical Security Gmail Troubleshooting Loyalty Specifications Scalability Smart Technology Camera Current Events Relocation User Error Google Apps Computing Infrastructure NIST Hacker Computer Fan Sync Augmented Reality Data loss Amazon Web Services Nanotechnology Shortcuts Tip of the week Monitor Downtime Remote Work Practices Wireless Document Management Microchip Recovery Recycling SaaS Digital Signature Two Factor Authentication Knowledge webinar Workers Addiction Experience Cryptocurrency The Internet of Things Best Practice Remote Worker Screen Mirroring Online Shopping Smart Tech Risk Management Social Windows 10s Windows Server 2008 Root Cause Analysis Hosted Computing Hiring/Firing Search Engine HBO eWaste Webinar Thank You Company Culture CrashOverride Compliance Twitter Congratulations Managing Stress Regulation Printers Smartwatch

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

AngusCousens Preventing Identity Theft Should be a Priority, But Do You Know How to Handle It?
27 December 2018
What a good story you have written and I feel good reading about your story and we should share thin...
George Nivison Bring Your Own Device Is Great...When Applied Properly
21 December 2018
If you think you device get slow then try once again for the device sharing speed with the connectin...
Chantale Bass Tip of the Week: How to Use Tabs to Their Full Potential
15 December 2018
Tabs we need to use only with the ways of the potentially uses from the internet use and also for th...
JoseSClark How You Can Get Microsoft Office Certified
14 December 2018
Many users want to get Microsoft Office certified for theirselve and it was a good post for them. Re...
Donna Brock 3 Significant Ways the Cloud Can Grow Your Business
13 December 2018
In every field of life technology have a big name and now technology provide the facility to save yo...