(707) 268-8850    Get SUPPORT

Network Management Services Blog

Attempts to Make Smart Cities Hit a Snag

Attempts to Make Smart Cities Hit a Snag

At this point, the concept of the Internet of Things is a fairly familiar one, but that familiarity is to the Internet of Things on the micro scale--appliances with capabilities enhanced by an available connection to the Internet. There is another, more macro application to the Internet of Things: as a way to collect data in a municipal setting. However, like the IoT we are familiar with, these “smart cities” are host to many familiar problems.

The Concept of a Smart City
Like many technological developments, the idea of a smart city is built on good intentions. Through the use of technology (much of it based in the IoT), a smart city leverages collected data to functionally serve the public, embetter the services of government, and improve the quality of life for its citizenry.

That’s the idea, at least.

Unfortunately, like many of the ‘smart’ devices that the populace can interact with, the systems that these cities leverage tend to be susceptible to attack.

What These Attacks Could Do
In order to understand the potential ramifications of these kinds of attacks, it is important to first have an understanding of the kinds of systems that a smart city is built upon.

The true purpose behind creating a smart city is to make it a better place to live, and to do that, certain systems need to be put in place. These systems are powered by the data they collect. With that data, insights into correlated problems can be leveraged to solve them.

The sensors that these cities use to collect this data monitor a wide variety of factors, ranging from traffic conditions to the weather and even health-related factors like air quality and radiation. The data that is collected is then used, through the power of automation, to decide how to approach infrastructural concerns. For instance, if traffic is moving slowly in an area, these systems would deliver that data to decision-makers, allowing them to make the call to reroute traffic a different way to ease the congestion. This system just makes the decisions, too.

The big problem with this is that now, if these systems don’t have sufficient security measures in place, they leave the city’s infrastructure vulnerable to attack. Unfortunately, in an initial study of three companies who provide these kinds of smart city systems, 17 basic vulnerabilities were present in their products. These vulnerabilities included things like easily guessable passwords, bugs that could allow malware to be introduced, and opportunities for authentication requirements to be side-stepped.

Why This Matters
The harsh reality is that developing smart cities with these kinds of vulnerabilities is the geopolitical equivalent of intentionally wearing a “Kick Me” sign each and every time you went out in public. The United States of America have already learned this the hard way, as electoral systems and the energy grid have been hijacked recently. If appearances aren’t deceiving, actions are being taken to reinforce these vulnerabilities in these IoT devices, but it certainly doesn’t help if careless oversights are being made in the security of major metropolitan areas.

We’re not saying that bringing the Internet of Things to cities is a bad thing, but the security needs to be there. The same goes for businesses. If your business relies on devices that connect to the Internet, like physical security devices, smart appliances, and networking infrastructure, locking down these devices and keeping them patched is critical to keep your operations running without a hitch.

Give Network Management Services a call at (707) 268-8850 to learn about the security options we have to offer you.

Hackers Plus Artificial Intelligence Equals Big Tr...
Tip of the Week: Set Your System up with the Apps ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, September 19 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Innovation Backup VoIP Hosted Solutions Mobile Devices Email Google Data Recovery Outsourced IT Data IT Support Tech Term Saving Money Microsoft Internet of Things Software Cloud Computing Hardware IT Services Internet Business Continuity Efficiency BDR Communications Business Cybersecurity Cybercrime Small Business Ransomware User Tips Artificial Intelligence Smartphones Communication Disaster Recovery Android How To Smartphone Windows Avoiding Downtime Save Money Managed IT Managed IT Services Network Server Gadgets Browser Computers Alert Windows 10 Miscellaneous Data Security Data Protection Router BYOD Social Media Mobile Device Management Law Enforcement Applications Social Engineering Vulnerability Two-factor Authentication Business Management Passwords Productivity Mobility Chrome Phishing Firewall Business Intelligence Money Collaboration Office 365 Document Management Upgrade Identity Theft Productivity Redundancy Managed Service Provider Bandwidth Facebook Blockchain Spam Private Cloud Proactive IT IT Support Remote Monitoring Computer Flexibility Connectivity Word Virtualization Operating System Workplace Tips Telephone Systems Compliance Budget VPN Website Work/Life Balance Encryption File Sharing Data Breach Access Control Automation Content Management Paperless Office Content Filtering Physical Security Government Smart Tech Managed Service Data loss OneNote Comparison Google Drive Value IT Management Windows 10 Credit Cards Quick Tips Analysis Virtual Assistant Networking Windows 7 Employer-Employee Relationship Wi-Fi Office Tips Bring Your Own Device Public Cloud IT Plan Mobile Device Infrastructure Unified Threat Management Update Data storage App Apps Solid State Drive Sports Unsupported Software Data Storage Holiday Servers Training Workers Microsoft Office Password Business Owner CES Mobile Computing Hacking Information Technology Settings Big Data Information Spam Blocking Hosted Solution Unified Communications Thought Leadership Meetings Travel Cortana YouTube Scam Tip of the week Telecommuting Office Remote Worker webinar Mobile Enterprise Content Management Advertising Online Shopping Education Gmail Cache Samsung Data Warehousing Voice over Internet Protocol User Error Legal Risk Management Knowledge Windows 10s Recovery Theft Streaming Media Charger Emails Colocation Strategy Business Technology Windows Server 2008 Remote Work Relocation Evernote Authentication Wiring Conferencing Professional Services Hiring/Firing Health Save Time Password Management Students HBO Recycling Wireless Internet Multi-Factor Security Insurance Electronic Medical Records Network Congestion Sync Google Apps Content Filter Screen Mirroring Software as a Service Computing Infrastructure HaaS Humor Wireless Charging Nanotechnology CrashOverride Tools Files Human Resources NIST Healthcare Outlook Specifications Audit Telephony Apple eWaste Wire Trending Reputation Internet Exlporer HIPAA Fraud Practices IT Consultant Storage Cast Augmented Reality Entertainment Accountants Telephone System Supercomputer Regulations Fiber-Optic Downtime Wireless Technology Staff Cryptocurrency Electronic Health Records Emergency Frequently Asked Questions Millennials Hybrid Cloud USB Leadership Computer Fan Skype Hard Drives Safety iPhone Criminal SaaS Lifestyle IBM Customer End of Support Amazon Hosted Computing PDF Black Market Password Manager Cleaning Netflix The Internet of Things Monitor History Marketing Hacker Cables Devices Root Cause Analysis Botnet Data Management Digital Signature Safe Mode Machine Learning Patch Management Excel Workforce FENG Start Menu HVAC Smart Office Software Tips Internet exploMicrosoft Keyboard Amazon Web Services Inventory MSP Business Mangement Addiction Computer Care Google Docs IoT Current Events Flash Vendor Management Techology Users How to Bluetooth Assessment Customer Service Remote Computing Experience Mobile Office Domains Content Company Culture Transportation Wireless Books Television Scalability Music Best Practice Politics Proactive Shadow IT Webinar Public Speaking Audiobook Managing Stress Benefits Fun Camera Worker Presentation Public Computer Wearable Technology Lithium-ion battery Virtual Reality Loyalty Remote Monitoring and Maintenance IT solutions Administration Smart Technology Printers Rootkit 5G Automobile Tech Support Worker Commute Line of Business Employer Employee Relationship Twitter WiFi Regulation Search Instant Messaging Troubleshooting Computer Accessories Competition Customer Relationship Management Video Games Battery Two Factor Authentication IP Address