(707) 268-8850    Get SUPPORT

Network Management Services Blog

Attempts to Make Smart Cities Hit a Snag

Attempts to Make Smart Cities Hit a Snag

At this point, the concept of the Internet of Things is a fairly familiar one, but that familiarity is to the Internet of Things on the micro scale--appliances with capabilities enhanced by an available connection to the Internet. There is another, more macro application to the Internet of Things: as a way to collect data in a municipal setting. However, like the IoT we are familiar with, these “smart cities” are host to many familiar problems.

The Concept of a Smart City
Like many technological developments, the idea of a smart city is built on good intentions. Through the use of technology (much of it based in the IoT), a smart city leverages collected data to functionally serve the public, embetter the services of government, and improve the quality of life for its citizenry.

That’s the idea, at least.

Unfortunately, like many of the ‘smart’ devices that the populace can interact with, the systems that these cities leverage tend to be susceptible to attack.

What These Attacks Could Do
In order to understand the potential ramifications of these kinds of attacks, it is important to first have an understanding of the kinds of systems that a smart city is built upon.

The true purpose behind creating a smart city is to make it a better place to live, and to do that, certain systems need to be put in place. These systems are powered by the data they collect. With that data, insights into correlated problems can be leveraged to solve them.

The sensors that these cities use to collect this data monitor a wide variety of factors, ranging from traffic conditions to the weather and even health-related factors like air quality and radiation. The data that is collected is then used, through the power of automation, to decide how to approach infrastructural concerns. For instance, if traffic is moving slowly in an area, these systems would deliver that data to decision-makers, allowing them to make the call to reroute traffic a different way to ease the congestion. This system just makes the decisions, too.

The big problem with this is that now, if these systems don’t have sufficient security measures in place, they leave the city’s infrastructure vulnerable to attack. Unfortunately, in an initial study of three companies who provide these kinds of smart city systems, 17 basic vulnerabilities were present in their products. These vulnerabilities included things like easily guessable passwords, bugs that could allow malware to be introduced, and opportunities for authentication requirements to be side-stepped.

Why This Matters
The harsh reality is that developing smart cities with these kinds of vulnerabilities is the geopolitical equivalent of intentionally wearing a “Kick Me” sign each and every time you went out in public. The United States of America have already learned this the hard way, as electoral systems and the energy grid have been hijacked recently. If appearances aren’t deceiving, actions are being taken to reinforce these vulnerabilities in these IoT devices, but it certainly doesn’t help if careless oversights are being made in the security of major metropolitan areas.

We’re not saying that bringing the Internet of Things to cities is a bad thing, but the security needs to be there. The same goes for businesses. If your business relies on devices that connect to the Internet, like physical security devices, smart appliances, and networking infrastructure, locking down these devices and keeping them patched is critical to keep your operations running without a hitch.

Give Network Management Services a call at (707) 268-8850 to learn about the security options we have to offer you.

Hackers Plus Artificial Intelligence Equals Big Tr...
Tip of the Week: Set Your System up with the Apps ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, January 20 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Innovation Backup Hosted Solutions VoIP Mobile Devices Google Email Data Outsourced IT Tech Term Data Recovery IT Support IT Services Software Saving Money Internet of Things Internet Cloud Computing Microsoft Business Continuity Efficiency Communications Hardware BDR Communication Cybercrime Small Business Cybersecurity Ransomware Business Smartphones User Tips Server Android Artificial Intelligence Disaster Recovery Save Money How To Managed IT Gadgets Browser Network Alert Computers Managed IT Services Smartphone Avoiding Downtime Windows Passwords Law Enforcement Social Engineering Productivity Workplace Tips Business Intelligence Mobility Windows 10 Miscellaneous Business Management Data Security Data Protection Collaboration Social Media Money Vulnerability Router Mobile Device Management Chrome BYOD Two-factor Authentication Firewall Phishing Computer Applications Private Cloud Blockchain Word Productivity Bandwidth Flexibility Budget Remote Monitoring Telephone Systems Proactive IT Operating System Connectivity Virtualization Office 365 IT Support Upgrade Redundancy Spam VPN Document Management Compliance Identity Theft Managed Service Provider Facebook Google Drive Data Breach Update Credit Cards Content Filtering Office Tips Analysis Apps Quick Tips Unsupported Software Mobile Device Public Cloud Servers Employer-Employee Relationship Data Storage App Microsoft Office Value Solid State Drive Infrastructure Data storage Mobile Computing Big Data Spam Blocking Networking Holiday Bring Your Own Device Information Password Website Sports File Sharing Business Owner Unified Threat Management Information Technology Hacking Managed Service Data loss Work/Life Balance CES Comparison OneNote Encryption Windows 10 IT Management Physical Security Windows 7 Access Control Automation Content Management Paperless Office Training Workers Smart Tech Government Virtual Assistant Wi-Fi Settings IT Plan Regulations Evernote Authentication Scam Hiring/Firing Health Cast HaaS Students Augmented Reality Frequently Asked Questions Millennials Insurance Telephone System Downtime Recycling Wireless Technology Wireless Internet webinar IBM Samsung Humor Cryptocurrency Computer Fan Skype Google Apps Content Filter Safety Knowledge Computing Infrastructure Lifestyle HIPAA Charger Emails Wireless Charging Marketing Nanotechnology Hacker Files Entertainment Human Resources The Internet of Things Healthcare Excel Workforce USB Fraud Practices Apple Root Cause Analysis Botnet eWaste Wire Conferencing Reputation Internet Exlporer Accountants Safe Mode FENG Start Menu Storage Electronic Medical Records Network Congestion Software Tips Electronic Health Records Hybrid Cloud HVAC Flash PDF Black Market Fiber-Optic MSP Google Docs Staff End of Support Tip of the week Telecommuting Amazon Hosted Computing Hard Drives iPhone Meetings Travel Data Management Criminal Customer Keyboard Mobile Password Manager IT Consultant Monitor History Digital Signature Machine Learning Enterprise Content Management Windows 10s Cables Devices Supercomputer Remote Worker Data Warehousing Voice over Internet Protocol Internet exploMicrosoft Windows Server 2008 Remote Work Hosted Solution Amazon Web Services Inventory Emergency Smart Office IoT SaaS Business Technology Professional Services Business Mangement Addiction Leadership HBO YouTube Cleaning Netflix Office Password Management Sync Education Unified Communications Thought Leadership Cortana Wiring Multi-Factor Security Legal Risk Management Advertising Recovery Online Shopping Patch Management Screen Mirroring Software as a Service Outlook Specifications CrashOverride Tools Save Time Gmail Cache User Error Strategy Computer Care Relocation NIST Audit Telephony Theft Streaming Media Current Events Colocation Camera Trending Shadow IT Remote Monitoring and Maintenance Audiobook Vendor Management Wearable Technology Tech Support Assessment 5G Bluetooth Managing Stress Fun Virtual Reality Printers Transportation Line of Business WiFi Books Television Regulation Automobile Customer Relationship Management Worker Commute Competition Administration Webinar IP Address Benefits Instant Messaging Troubleshooting Users Public Computer Worker Video Games Customer Service Loyalty Search Twitter IT solutions Battery Mobile Office Smart Technology How to Techology Domains Rootkit Remote Computing Experience Wireless Employer Employee Relationship Proactive Content Public Speaking Scalability Music Presentation Computer Accessories Company Culture Lithium-ion battery Two Factor Authentication Best Practice Politics