094 90 48200     Get SUPPORT

Aniar IT Services Blog

Attempts to Make Smart Cities Hit a Snag

Attempts to Make Smart Cities Hit a Snag

At this point, the concept of the Internet of Things is a fairly familiar one, but that familiarity is to the Internet of Things on the micro scale--appliances with capabilities enhanced by an available connection to the Internet. There is another, more macro application to the Internet of Things: as a way to collect data in a municipal setting. However, like the IoT we are familiar with, these “smart cities” are host to many familiar problems.

The Concept of a Smart City
Like many technological developments, the idea of a smart city is built on good intentions. Through the use of technology (much of it based in the IoT), a smart city leverages collected data to functionally serve the public, embetter the services of government, and improve the quality of life for its citizenry.

That’s the idea, at least.

Unfortunately, like many of the ‘smart’ devices that the populace can interact with, the systems that these cities leverage tend to be susceptible to attack.

What These Attacks Could Do
In order to understand the potential ramifications of these kinds of attacks, it is important to first have an understanding of the kinds of systems that a smart city is built upon.

The true purpose behind creating a smart city is to make it a better place to live, and to do that, certain systems need to be put in place. These systems are powered by the data they collect. With that data, insights into correlated problems can be leveraged to solve them.

The sensors that these cities use to collect this data monitor a wide variety of factors, ranging from traffic conditions to the weather and even health-related factors like air quality and radiation. The data that is collected is then used, through the power of automation, to decide how to approach infrastructural concerns. For instance, if traffic is moving slowly in an area, these systems would deliver that data to decision-makers, allowing them to make the call to reroute traffic a different way to ease the congestion. This system just makes the decisions, too.

The big problem with this is that now, if these systems don’t have sufficient security measures in place, they leave the city’s infrastructure vulnerable to attack. Unfortunately, in an initial study of three companies who provide these kinds of smart city systems, 17 basic vulnerabilities were present in their products. These vulnerabilities included things like easily guessable passwords, bugs that could allow malware to be introduced, and opportunities for authentication requirements to be side-stepped.

Why This Matters
The harsh reality is that developing smart cities with these kinds of vulnerabilities is the geopolitical equivalent of intentionally wearing a “Kick Me” sign each and every time you went out in public. The United States of America have already learned this the hard way, as electoral systems and the energy grid have been hijacked recently. If appearances aren’t deceiving, actions are being taken to reinforce these vulnerabilities in these IoT devices, but it certainly doesn’t help if careless oversights are being made in the security of major metropolitan areas.

We’re not saying that bringing the Internet of Things to cities is a bad thing, but the security needs to be there. The same goes for businesses. If your business relies on devices that connect to the Internet, like physical security devices, smart appliances, and networking infrastructure, locking down these devices and keeping them patched is critical to keep your operations running without a hitch.

Give Aniar IT Services a call at 094 90 48200 to learn about the security options we have to offer you.

Hackers Plus Artificial Intelligence Equals Big Tr...
Tip of the Week: Set Your System up with the Apps ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, April 23 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy User Tips Google Business Computing Cloud Tech Term Productivity Internet Email Network Security Data Backup Microsoft Data Innovation Data Recovery Hosted Solutions Hardware Mobile Devices Workplace Tips Communications Hackers Malware Cloud Computing VoIP Communication Smartphone Android IT Services Windows 10 Smartphones Efficiency Small Business IT Support Software Managed IT Services Browser Backup Business Network Artificial Intelligence Business Management Internet of Things Gadgets Chrome How To Router Windows Collaboration Mobile Device Cybersecurity Outsourced IT Business Continuity Applications Information Office 365 Computers Word Saving Money Cybercrime Spam Server Computer BDR Connectivity Encryption Facebook Managed Service Settings Miscellaneous Data Security Paperless Office Phishing Social Media Ransomware Data Protection Mobile Device Management Holiday Money Two-factor Authentication Vulnerability Passwords Operating System App Sports Meetings Botnet Access Control Apps BYOD CES Disaster Recovery Google Drive Windows 7 Microsoft Office Fraud Managed IT services Redundancy Voice over Internet Protocol Human Resources Virtual Assistant Infrastructure Telephone Systems Content Management Remote Monitoring Keyboard Private Cloud IT Plan Website OneNote Social Engineering VPN Staff Save Money Virtualization Avoiding Downtime Password Blockchain Upgrade Unsupported Software Comparison Data Storage Automation Telephone System Google Docs Law Enforcement Spam Blocking Machine Learning Wi-Fi Telephony Identity Theft Scam Cryptocurrency Display Managed IT Bring Your Own Device Software as a Service Augmented Reality Business Intelligence Training IT Management Update YouTube Mouse 5G Credit Cards OLED PDF Google Search HBO Gmail Data Management Safe Mode Security Cameras Workers Telecommuting Smart Office Quick Tips Solid State Drive Networking Shortcuts The Internet of Things Downtime Evernote Cleaning Remote Worker Database Hacker Windows 10s Computer Care Microchip Skype Biometric Security Save Time Screen Mirroring Outlook Government Recycling Devices Physical Security Smartwatch Employer-Employee Relationship Travel Remote Work Authentication Document Management Camera Audit Patch Management Cache Enterprise Content Management Mobility Big Data Root Cause Analysis Tools Work/Life Balance Practices Wiring Business Technology Search Engine Start Menu Amazon Proactive IT Users Cast Frequently Asked Questions Recovery eWaste Thought Leadership Sync Multi-Factor Security Health Bandwidth WiFi Wireless Internet Password Management Social Charger Millennials Hosted Computing Firewall Public Cloud Servers Bing Amazon Web Services Accountants MSP Net Neutrality Excel Legal Wireless Computer Fan Employee Data loss Password Manager Nanotechnology Entertainment Warranty Flash HIPAA USB NIST Vendor Value Wireless Charging Workforce Inventory Unified Threat Management Software Tips HVAC Help Desk Specifications File Sharing ISP Tip of the week Criminal Printer FENG Education Trending Digital Signature Digital Signage Cortana Alert Business Mangement Smart Tech HaaS Electronic Medical Records Wire Google Apps Mobile Computing Online Shopping Cryptomining Windows Server 2008 Addiction Wireless Technology Regulation Tech Support IBM Hiring/Firing Safety Productivity Emergency Marketing Company Culture Fun Budget Customer Relationship Management Competition IP Address Managing Stress Manufacturing Customer Service Printers Hard Drives Mobile Office Domains Search Windows 10 Public Speaking CrashOverride Twitter Presentation Compliance Lithium-ion battery Managed Service Provider