Infracore LLC Blog

Attempts to Make Smart Cities Hit a Snag

Attempts to Make Smart Cities Hit a Snag

At this point, the concept of the Internet of Things is a fairly familiar one, but that familiarity is to the Internet of Things on the micro scale--appliances with capabilities enhanced by an available connection to the Internet. There is another, more macro application to the Internet of Things: as a way to collect data in a municipal setting. However, like the IoT we are familiar with, these “smart cities” are host to many familiar problems.

The Concept of a Smart City
Like many technological developments, the idea of a smart city is built on good intentions. Through the use of technology (much of it based in the IoT), a smart city leverages collected data to functionally serve the public, embetter the services of government, and improve the quality of life for its citizenry.

That’s the idea, at least.

Unfortunately, like many of the ‘smart’ devices that the populace can interact with, the systems that these cities leverage tend to be susceptible to attack.

What These Attacks Could Do
In order to understand the potential ramifications of these kinds of attacks, it is important to first have an understanding of the kinds of systems that a smart city is built upon.

The true purpose behind creating a smart city is to make it a better place to live, and to do that, certain systems need to be put in place. These systems are powered by the data they collect. With that data, insights into correlated problems can be leveraged to solve them.

The sensors that these cities use to collect this data monitor a wide variety of factors, ranging from traffic conditions to the weather and even health-related factors like air quality and radiation. The data that is collected is then used, through the power of automation, to decide how to approach infrastructural concerns. For instance, if traffic is moving slowly in an area, these systems would deliver that data to decision-makers, allowing them to make the call to reroute traffic a different way to ease the congestion. This system just makes the decisions, too.

The big problem with this is that now, if these systems don’t have sufficient security measures in place, they leave the city’s infrastructure vulnerable to attack. Unfortunately, in an initial study of three companies who provide these kinds of smart city systems, 17 basic vulnerabilities were present in their products. These vulnerabilities included things like easily guessable passwords, bugs that could allow malware to be introduced, and opportunities for authentication requirements to be side-stepped.

Why This Matters
The harsh reality is that developing smart cities with these kinds of vulnerabilities is the geopolitical equivalent of intentionally wearing a “Kick Me” sign each and every time you went out in public. The United States of America have already learned this the hard way, as electoral systems and the energy grid have been hijacked recently. If appearances aren’t deceiving, actions are being taken to reinforce these vulnerabilities in these IoT devices, but it certainly doesn’t help if careless oversights are being made in the security of major metropolitan areas.

We’re not saying that bringing the Internet of Things to cities is a bad thing, but the security needs to be there. The same goes for businesses. If your business relies on devices that connect to the Internet, like physical security devices, smart appliances, and networking infrastructure, locking down these devices and keeping them patched is critical to keep your operations running without a hitch.

Give Infracore LLC a call at (858) 509-1970 to learn about the security options we have to offer you.

Hackers Plus Artificial Intelligence Equals Big Tr...
Tip of the Week: Set Your System up with the Apps ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, November 17 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business computing Network Security Google Hackers Malware Innovation Software Microsoft Data Business Hardware Internet Smartphones Hosted Solutions Backup Tech Term Email Browser Windows 10 User Tips Computer Business Continuity Android Mobile Devices VoIP Data Backup Business Management IT Services Productivity Managed IT Services Alert Small Business Workplace Tips Communications Miscellaneous Data Recovery Smartphone Chrome Office Managed IT Services Ransomware Cloud Computing Outsourced IT Computers Disaster Recovery Network Artificial Intelligence Communication Efficiency Cybercrime Law Enforcement Collaboration Cybersecurity Productivity Router Money Passwords Internet of Things Social Media Windows 10 Password Applications Facebook Virtualization How To Windows Telephone Systems Saving Money Work/Life Balance Quick Tips Upgrade IT Support Server App Health Office 365 Gadgets Social Engineering Information Holiday Phishing HaaS Office Tips Keyboard Two-factor Authentication Data Security Word IT Support Connectivity Microsoft Office Scam Data Breach Hacking Vulnerability Wi-Fi Spam BDR Private Cloud Mobile Device Management Bring Your Own Device Save Money Google Drive Data Protection Automation Apps Marketing Employer-Employee Relationship IT Plan Business Intelligence Managed Service End of Support Battery Charger Operating System Virtual Assistant Blockchain History Update Patch Management Identity Theft Unsupported Software Infrastructure Encryption Sports Remote Monitoring Cleaning Telephone System Remote Computing PDF Worker Managed IT Flexibility Big Data VPN Computer Care Windows 7 Managed Service Provider Settings Legal Fraud BYOD Mobility Automobile Government Electronic Medical Records Data Storage Samsung Comparison Training Website CES Bandwidth Entertainment Servers Data Management OneNote Public Cloud IT Management Paperless Office USB Value Redundancy Avoiding Downtime Spam Blocking Voice over Internet Protocol Content Management Mobile Device Firewall Networking Hybrid Cloud Search Bluetooth IT solutions Physical Security Recovery HVAC Recycling Data storage Emergency Public Computer Tools Remote Work Wiring Practices Save Time Machine Learning Workers Bing Addiction Virtual Reality Troubleshooting Loyalty Computer Fan Sync Digital Signature Instant Messaging Data loss Wire Online Shopping Printer Smart Tech Tip of the week Video Games Audiobook Smart Technology Current Events Apple How to Enterprise Content Management eWaste Downtime Unified Threat Management Hosted Computing webinar YouTube Help Desk Cache Worker Commute SaaS The Internet of Things Millennials MSP Internet exploMicrosoft Screen Mirroring Evernote Mouse Education Experience Windows 10s Windows Server 2008 Multi-Factor Security HIPAA Two Factor Authentication Knowledge iPhone Black Market Risk Management HBO WiFi Password Management Criminal Root Cause Analysis Credit Cards Mobile Computing Inventory Hiring/Firing Conferencing Software Tips Password Manager FENG Telephony Workforce File Sharing Advertising Cast Smart Office Wireless Charging Administrator Devices Computing Infrastructure Music Trending Human Resources Relocation User Error Scalability Network Congestion Politics Rootkit Outlook Google Docs NIST Transportation Safety Botnet Camera Access Control Employer Employee Relationship Emails Business Mangement Monitor Books Assessment Skype Augmented Reality Accountants Wireless IT Consultant Document Management Cortana Microchip Thought Leadership Wearable Technology Solid State Drive Flash Staff Authentication Frequently Asked Questions Cryptocurrency Best Practice Benefits Meetings Travel Amazon Computer Accessories Gmail Television Start Menu Telecommuting Remote Worker Leadership Google Apps Search Engine Techology Users Audit Specifications Humor Information Technology Internet Exlporer Amazon Web Services Warranty Nanotechnology Vendor Management Excel Safe Mode Files Content Wireless Internet CrashOverride Thank You Company Culture Software as a Service Congratulations Compliance Managing Stress Regulation Printers Webinar Twitter

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

BessieLHuerta 8 Data Backup Terms You Should Know
15 November 2018
I can understand the importance of this content about the data backup and I think it will attract ma...
Constance Rowe Are You Intrigued By the Tech of CES 2018?
15 November 2018
An internal blog is intriguing for the storing of the information. The visitors of the https://www.b...
Leo Reid A Few Security Lessons Your Business Can Learn From Game of Thrones
07 November 2018
Few lessons of the learning have been consumed for the better range of the people. The sort of the i...
Risa Franklin Is a Data Backup Really That Necessary? In a Word: Yes
01 November 2018
Data protection is very important for us with we can get rid from various kinds of problems while ru...
Sybil Stephens Is a Data Backup Really That Necessary? In a Word: Yes
20 October 2018
Backup data for the word Microsoft is really needed that only some written material will be come to ...