(707) 268-8850    Get SUPPORT

Network Management Services Blog

Attempts to Make Smart Cities Hit a Snag

Attempts to Make Smart Cities Hit a Snag

At this point, the concept of the Internet of Things is a fairly familiar one, but that familiarity is to the Internet of Things on the micro scale--appliances with capabilities enhanced by an available connection to the Internet. There is another, more macro application to the Internet of Things: as a way to collect data in a municipal setting. However, like the IoT we are familiar with, these “smart cities” are host to many familiar problems.

The Concept of a Smart City
Like many technological developments, the idea of a smart city is built on good intentions. Through the use of technology (much of it based in the IoT), a smart city leverages collected data to functionally serve the public, embetter the services of government, and improve the quality of life for its citizenry.

That’s the idea, at least.

Unfortunately, like many of the ‘smart’ devices that the populace can interact with, the systems that these cities leverage tend to be susceptible to attack.

What These Attacks Could Do
In order to understand the potential ramifications of these kinds of attacks, it is important to first have an understanding of the kinds of systems that a smart city is built upon.

The true purpose behind creating a smart city is to make it a better place to live, and to do that, certain systems need to be put in place. These systems are powered by the data they collect. With that data, insights into correlated problems can be leveraged to solve them.

The sensors that these cities use to collect this data monitor a wide variety of factors, ranging from traffic conditions to the weather and even health-related factors like air quality and radiation. The data that is collected is then used, through the power of automation, to decide how to approach infrastructural concerns. For instance, if traffic is moving slowly in an area, these systems would deliver that data to decision-makers, allowing them to make the call to reroute traffic a different way to ease the congestion. This system just makes the decisions, too.

The big problem with this is that now, if these systems don’t have sufficient security measures in place, they leave the city’s infrastructure vulnerable to attack. Unfortunately, in an initial study of three companies who provide these kinds of smart city systems, 17 basic vulnerabilities were present in their products. These vulnerabilities included things like easily guessable passwords, bugs that could allow malware to be introduced, and opportunities for authentication requirements to be side-stepped.

Why This Matters
The harsh reality is that developing smart cities with these kinds of vulnerabilities is the geopolitical equivalent of intentionally wearing a “Kick Me” sign each and every time you went out in public. The United States of America have already learned this the hard way, as electoral systems and the energy grid have been hijacked recently. If appearances aren’t deceiving, actions are being taken to reinforce these vulnerabilities in these IoT devices, but it certainly doesn’t help if careless oversights are being made in the security of major metropolitan areas.

We’re not saying that bringing the Internet of Things to cities is a bad thing, but the security needs to be there. The same goes for businesses. If your business relies on devices that connect to the Internet, like physical security devices, smart appliances, and networking infrastructure, locking down these devices and keeping them patched is critical to keep your operations running without a hitch.

Give Network Management Services a call at (707) 268-8850 to learn about the security options we have to offer you.

Hackers Plus Artificial Intelligence Equals Big Tr...
Tip of the Week: Set Your System up with the Apps ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, April 18 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Innovation Backup VoIP Mobile Devices Hosted Solutions Google Email Outsourced IT Tech Term Data Recovery Data IT Support IT Services Saving Money Internet of Things Internet Cloud Computing Microsoft Software Business Continuity Efficiency Hardware BDR Communications Cybersecurity Business Smartphones Ransomware Communication Cybercrime Small Business User Tips Android Artificial Intelligence Server Disaster Recovery Managed IT Smartphone Gadgets Windows Browser Alert Managed IT Services Network Computers Avoiding Downtime Save Money How To Productivity Workplace Tips Law Enforcement Social Engineering Mobility Business Intelligence Miscellaneous Business Management Collaboration Windows 10 Social Media Data Security Data Protection Router Mobile Device Management Chrome BYOD Vulnerability Two-factor Authentication Firewall Phishing Computer Applications Passwords Money Managed Service Provider Word Bandwidth Flexibility Budget Telephone Systems Private Cloud Proactive IT IT Support Office 365 Connectivity Upgrade Remote Monitoring Redundancy Spam Virtualization Document Management Operating System Compliance Facebook VPN Identity Theft Blockchain Productivity Credit Cards Government Information File Sharing Unsupported Software App Microsoft Office Analysis Servers Value Data Storage Solid State Drive Google Drive Managed Service Networking Holiday Big Data Infrastructure Bring Your Own Device Quick Tips Mobile Computing Password Website Spam Blocking Employer-Employee Relationship Business Owner Public Cloud Unified Threat Management Information Technology Sports Virtual Assistant Data storage Work/Life Balance Windows 10 Data loss CES Training Workers OneNote Comparison IT Management Wi-Fi Encryption Access Control Settings Content Management Paperless Office Hacking Windows 7 Smart Tech Data Breach Content Filtering IT Plan Office Tips Mobile Device Automation Update Apps Physical Security Insurance Charger Emails Downtime Marketing Hacker Recycling Wireless Internet User Error Frequently Asked Questions Millennials Entertainment The Internet of Things Conferencing Relocation Computer Fan Skype USB Google Apps Content Filter Colocation Lifestyle Enterprise Content Management Wireless Charging Nanotechnology Hiring/Firing Health Remote Worker Human Resources Healthcare Electronic Medical Records Network Congestion Fraud Practices Root Cause Analysis Botnet PDF Black Market eWaste Wire Excel Workforce Humor FENG Start Menu Business Technology Storage Computing Infrastructure Software Tips Data Management Accountants Flash Password Management Keyboard Fiber-Optic Files Google Docs Wiring Staff Electronic Health Records IT Consultant Amazon Hosted Computing Apple Meetings Travel Criminal Supercomputer Reputation Internet Exlporer Tip of the week Telecommuting Mobile Hosted Solution Password Manager Emergency Windows 10s NIST Cables Devices SaaS Data Warehousing Voice over Internet Protocol Camera Digital Signature Machine Learning Leadership Hybrid Cloud Legal Risk Management Amazon Web Services Inventory Cleaning Hard Drives Netflix iPhone Education Smart Office Customer End of Support Windows Server 2008 Remote Work Professional Services Telephone System Recovery Business Mangement Addiction Patch Management Monitor History HBO IoT Sync Cryptocurrency Unified Communications Thought Leadership Multi-Factor Security Save Time YouTube Online Shopping Computer Care Screen Mirroring Software as a Service Current Events Internet exploMicrosoft CrashOverride Tools Gmail Cache Scam Outlook Specifications HaaS Augmented Reality Audit Telephony Safe Mode Theft Streaming Media Cortana Trending Wireless Technology Strategy webinar Office HVAC HIPAA IBM Evernote Authentication Samsung Cast MSP Safety Students Knowledge Advertising Regulations Transportation Books Television Automobile Managing Stress Customer Relationship Management WiFi Worker Commute Competition Webinar IP Address Benefits Worker Fun Instant Messaging Users Troubleshooting Public Computer Video Games Customer Service Loyalty IT solutions Proactive Battery Mobile Office Smart Technology Rootkit How to Twitter Administration Techology Domains Remote Computing Experience Wireless Employer Employee Relationship Remote Monitoring and Maintenance Search Content Public Speaking Scalability Music Printers Presentation Computer Accessories Best Practice Politics Line of Business Lithium-ion battery Two Factor Authentication Vendor Management Regulation Shadow IT Audiobook Wearable Technology Tech Support Assessment 5G Company Culture Bluetooth Virtual Reality