(707) 268-8850    Get SUPPORT

Network Management Services Blog

Attempts to Make Smart Cities Hit a Snag

Attempts to Make Smart Cities Hit a Snag

At this point, the concept of the Internet of Things is a fairly familiar one, but that familiarity is to the Internet of Things on the micro scale--appliances with capabilities enhanced by an available connection to the Internet. There is another, more macro application to the Internet of Things: as a way to collect data in a municipal setting. However, like the IoT we are familiar with, these “smart cities” are host to many familiar problems.

The Concept of a Smart City
Like many technological developments, the idea of a smart city is built on good intentions. Through the use of technology (much of it based in the IoT), a smart city leverages collected data to functionally serve the public, embetter the services of government, and improve the quality of life for its citizenry.

That’s the idea, at least.

Unfortunately, like many of the ‘smart’ devices that the populace can interact with, the systems that these cities leverage tend to be susceptible to attack.

What These Attacks Could Do
In order to understand the potential ramifications of these kinds of attacks, it is important to first have an understanding of the kinds of systems that a smart city is built upon.

The true purpose behind creating a smart city is to make it a better place to live, and to do that, certain systems need to be put in place. These systems are powered by the data they collect. With that data, insights into correlated problems can be leveraged to solve them.

The sensors that these cities use to collect this data monitor a wide variety of factors, ranging from traffic conditions to the weather and even health-related factors like air quality and radiation. The data that is collected is then used, through the power of automation, to decide how to approach infrastructural concerns. For instance, if traffic is moving slowly in an area, these systems would deliver that data to decision-makers, allowing them to make the call to reroute traffic a different way to ease the congestion. This system just makes the decisions, too.

The big problem with this is that now, if these systems don’t have sufficient security measures in place, they leave the city’s infrastructure vulnerable to attack. Unfortunately, in an initial study of three companies who provide these kinds of smart city systems, 17 basic vulnerabilities were present in their products. These vulnerabilities included things like easily guessable passwords, bugs that could allow malware to be introduced, and opportunities for authentication requirements to be side-stepped.

Why This Matters
The harsh reality is that developing smart cities with these kinds of vulnerabilities is the geopolitical equivalent of intentionally wearing a “Kick Me” sign each and every time you went out in public. The United States of America have already learned this the hard way, as electoral systems and the energy grid have been hijacked recently. If appearances aren’t deceiving, actions are being taken to reinforce these vulnerabilities in these IoT devices, but it certainly doesn’t help if careless oversights are being made in the security of major metropolitan areas.

We’re not saying that bringing the Internet of Things to cities is a bad thing, but the security needs to be there. The same goes for businesses. If your business relies on devices that connect to the Internet, like physical security devices, smart appliances, and networking infrastructure, locking down these devices and keeping them patched is critical to keep your operations running without a hitch.

Give Network Management Services a call at (707) 268-8850 to learn about the security options we have to offer you.

Hackers Plus Artificial Intelligence Equals Big Tr...
Tip of the Week: Set Your System up with the Apps ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, November 15 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Hosted Solutions Innovation Backup Mobile Devices VoIP Email Google Data Tech Term Outsourced IT Data Recovery IT Support Microsoft Cloud Computing Software IT Services Saving Money Internet of Things Internet Business Continuity Efficiency Hardware BDR Communications Communication Small Business Cybercrime Cybersecurity Smartphones Business Ransomware Disaster Recovery User Tips Android Artificial Intelligence Server Computers Avoiding Downtime Smartphone Save Money Windows How To Gadgets Browser Managed IT Alert Managed IT Services Network BYOD Computer Chrome Money Phishing Firewall Passwords Applications Productivity Business Intelligence Social Engineering Workplace Tips Law Enforcement Windows 10 Data Security Data Protection Miscellaneous Mobility Business Management Social Media Collaboration Vulnerability Mobile Device Management Two-factor Authentication Router Word VPN Facebook Connectivity Managed Service Provider Productivity Budget Flexibility Private Cloud Bandwidth Office 365 Telephone Systems Proactive IT Redundancy IT Support Upgrade Remote Monitoring Identity Theft Operating System Spam Virtualization Blockchain Document Management Compliance Managed Service Hacking Training Update Workers Infrastructure Unsupported Software Settings Physical Security Data Storage Automation Servers Data Breach Apps Virtual Assistant Sports Government Content Filtering Office Tips Microsoft Office Mobile Device Mobile Computing Google Drive Spam Blocking CES Big Data App Quick Tips Website Value Solid State Drive Holiday Public Cloud Encryption Employer-Employee Relationship Networking Password Data loss Content Management Paperless Office Bring Your Own Device Access Control Data storage OneNote Smart Tech Comparison Business Owner IT Management Unified Threat Management Information Technology Work/Life Balance Information Windows 10 Windows 7 Credit Cards File Sharing Wi-Fi IT Plan Analysis Internet exploMicrosoft Cast Human Resources Healthcare Recovery Patch Management Wireless Charging Regulations Nanotechnology Business Technology Downtime eWaste Wire Augmented Reality Fraud Frequently Asked Questions Practices Millennials Save Time Cortana Computer Fan Skype Current Events Storage Wireless Technology Wiring Office Computer Care Accountants Lifestyle Password Management Safety HaaS Advertising Staff Electronic Health Records IBM Scam Fiber-Optic User Error Root Cause Analysis Criminal Botnet webinar The Internet of Things Amazon Excel Hosted Computing Workforce Marketing Hacker Colocation FENG Password Manager Start Menu Knowledge HIPAA Camera Relocation Software Tips Samsung NIST Entertainment Charger Digital Signature Google Docs Emails Machine Learning Hiring/Firing Health Cables Flash Devices Telephone System Meetings Travel Conferencing Smart Office USB Amazon Web Services Tip of the week Inventory Telecommuting Computing Infrastructure Electronic Medical Records Business Mangement Mobile Network Congestion Addiction Humor IoT Cryptocurrency Data Warehousing Voice over Internet Protocol YouTube PDF Black Market Files Windows 10s Unified Communications Thought Leadership Data Management Reputation Internet Exlporer Apple Online Shopping Windows Server 2008 Remote Work Gmail Professional Services IT Consultant Cache Keyboard HBO Safe Mode Theft Sync Supercomputer Streaming Media MSP Hybrid Cloud Strategy Multi-Factor Security HVAC Customer End of Support Screen Mirroring Software as a Service Students Hosted Solution Hard Drives iPhone Emergency Evernote Authentication Monitor History CrashOverride Recycling Tools Leadership Wireless Internet Outlook SaaS Insurance Specifications Audit Google Apps Telephony Content Filter Legal Risk Management Remote Worker Cleaning Trending Netflix Education Enterprise Content Management Content Lithium-ion battery Computer Accessories Scalability Music Two Factor Authentication 5G Best Practice Politics Tech Support Audiobook Proactive Vendor Management WiFi Shadow IT Bluetooth Wearable Technology Assessment Twitter Virtual Reality Competition Remote Monitoring and Maintenance Customer Relationship Management Transportation Automobile Books Television IP Address Printers Fun Users Worker Commute Line of Business Webinar Customer Service Benefits Regulation Worker Instant Messaging Troubleshooting Public Computer Mobile Office Administration Domains Video Games Loyalty Smart Technology Wireless IT solutions Company Culture Battery Techology Rootkit How to Employer Employee Relationship Public Speaking Remote Computing Experience Search Presentation Managing Stress