Male Rep 4


 "There is only one Boss. The Customer"

Have IT Questions?
Call us now (888) 894-6411

TWINTEL Solutions Blog

Attempts to Make Smart Cities Hit a Snag

Attempts to Make Smart Cities Hit a Snag

At this point, the concept of the Internet of Things is a fairly familiar one, but that familiarity is to the Internet of Things on the micro scale--appliances with capabilities enhanced by an available connection to the Internet. There is another, more macro application to the Internet of Things: as a way to collect data in a municipal setting. However, like the IoT we are familiar with, these “smart cities” are host to many familiar problems.

The Concept of a Smart City
Like many technological developments, the idea of a smart city is built on good intentions. Through the use of technology (much of it based in the IoT), a smart city leverages collected data to functionally serve the public, embetter the services of government, and improve the quality of life for its citizenry.

That’s the idea, at least.

Unfortunately, like many of the ‘smart’ devices that the populace can interact with, the systems that these cities leverage tend to be susceptible to attack.

What These Attacks Could Do
In order to understand the potential ramifications of these kinds of attacks, it is important to first have an understanding of the kinds of systems that a smart city is built upon.

The true purpose behind creating a smart city is to make it a better place to live, and to do that, certain systems need to be put in place. These systems are powered by the data they collect. With that data, insights into correlated problems can be leveraged to solve them.

The sensors that these cities use to collect this data monitor a wide variety of factors, ranging from traffic conditions to the weather and even health-related factors like air quality and radiation. The data that is collected is then used, through the power of automation, to decide how to approach infrastructural concerns. For instance, if traffic is moving slowly in an area, these systems would deliver that data to decision-makers, allowing them to make the call to reroute traffic a different way to ease the congestion. This system just makes the decisions, too.

The big problem with this is that now, if these systems don’t have sufficient security measures in place, they leave the city’s infrastructure vulnerable to attack. Unfortunately, in an initial study of three companies who provide these kinds of smart city systems, 17 basic vulnerabilities were present in their products. These vulnerabilities included things like easily guessable passwords, bugs that could allow malware to be introduced, and opportunities for authentication requirements to be side-stepped.

Why This Matters
The harsh reality is that developing smart cities with these kinds of vulnerabilities is the geopolitical equivalent of intentionally wearing a “Kick Me” sign each and every time you went out in public. The United States of America have already learned this the hard way, as electoral systems and the energy grid have been hijacked recently. If appearances aren’t deceiving, actions are being taken to reinforce these vulnerabilities in these IoT devices, but it certainly doesn’t help if careless oversights are being made in the security of major metropolitan areas.

We’re not saying that bringing the Internet of Things to cities is a bad thing, but the security needs to be there. The same goes for businesses. If your business relies on devices that connect to the Internet, like physical security devices, smart appliances, and networking infrastructure, locking down these devices and keeping them patched is critical to keep your operations running without a hitch.

Give TWINTEL Solutions a call at (888) 894-6411 to learn about the security options we have to offer you.

Hackers Plus Artificial Intelligence Equals Big Tr...
Tip of the Week: Set Your System up with the Apps ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, November 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!


Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Hackers Network Security Business Computing Backup Malware Hosted Solutions Data Google VoIP Mobile Devices Business Microsoft nonprofit Software bgc Disaster Recovery Email roundup Innovation Internet Managed IT Services Business Continuity Alert Outsourced IT communications Hardware Smartphones IT Services Browser Windows 10 Managed IT Services Tech Term User Tips Data Backup Ransomware Server Computer Saving Money Efficiency Data Recovery Android Cloud Computing Cybercrime Smartphone Computers Internet of Things Business Management IT Support Small Business Workplace Tips Network BDR Productivity Quick Tips Save Money IT Support Productivity Communication Office Windows Miscellaneous Passwords Recovery Artificial Intelligence Cybersecurity Money Mobile Device Management Social Engineering Chrome Applications Telephone Systems BYOD Managed IT Hacking Upgrade Law Enforcement Facebook Vulnerability Firewall Mobility Gadgets Work/Life Balance Virtualization Phishing Collaboration Social Media Windows 10 Budget Flexibility Information Proactive IT Router Private Cloud Office Tips Bandwidth App Bring Your Own Device Data Protection Avoiding Downtime How To Wi-Fi Compliance Password Holiday Automation Health Office 365 Remote Monitoring Managed Service Provider Microsoft Office Two-factor Authentication VPN Information Technology Connectivity Word Remote Computing Apps History Mobile Device Scam Black Market Keyboard Spam Value Operating System Sports Mobile Computing Redundancy Data Security Safety Servers Data Breach Identity Theft HaaS Google Drive Business Intelligence Credit Cards Automobile OneNote WiFi The Internet of Things Samsung CES Charger Settings Physical Security USB Windows 7 Fraud Data Management Encryption Managed Service Electronic Medical Records Content Management Unsupported Software Battery Content Filtering Entertainment Worker Data Storage Website Employer-Employee Relationship Business Owner Blockchain Virtual Assistant End of Support Emergency Unified Threat Management Spam Blocking Data storage Big Data IT Management Voice over Internet Protocol Hiring/Firing Wireless Technology Document Management SaaS Software as a Service Telephone System Comparison YouTube Cleaning Training Workers Infrastructure Paperless Office Legal IT Plan PDF HIPAA Government Save Time Update Risk Management Solid State Drive Computer Care Computing Infrastructure Marketing Patch Management Search Computer Accessories Conferencing Windows Server 2008 Cache Assessment Screen Mirroring Digital Signature Politics IT Consultant Outlook Millennials Warranty Humor Virtual Reality Cryptocurrency Hacker Lifestyle Inventory Wiring Help Desk Sync Wireless Charging Business Mangement HVAC Audiobook Supercomputer Data Warehousing Laptop How to Bluetooth Netflix Wireless Internet Apple Chromecast Television CrashOverride Cast Google Docs Leadership Workforce Devices Printer Worker Commute Audit Mobile Safe Mode Internet Exlporer Access Control Telephony Fiber-Optic Gmail Networking Video Games Transportation Current Events Touchpad Troubleshooting Regulations Amazon Cortana Wire iPhone Public Computer Accountants MSP Scalability Experience Frequently Asked Questions Telecommuting Thought Leadership Mouse NarrowBand Loyalty Computer Fan Professional Services Benefits Knowledge Software Tips Authentication Education Skype Cables Recycling Enterprise Content Management User Error Wireless Microchip Rootkit Amazon Web Services Google Apps Smart Office Downtime File Sharing Going Green Excel Remote Work Twitter Administrator Techology FENG Meetings Human Resources Reputation Advertising Smart Technology Network Congestion Nanotechnology Camera Hard Drives Windows 10s Start Menu Unified Communications eWaste Password Management Monitor Colocation Search Engine Shadow IT Books Online Shopping Robot Multi-Factor Security Practices Augmented Reality Customers Instant Messaging Employer Employee Relationship webinar Tip of the week Addiction Data loss Staff Regulation Two Factor Authentication HBO Specifications Smart Tech Printers Relocation Users Public Cloud Tools Theft Criminal NIST Hosted Computing Remote Worker Bing Hosted Solution Vendor Management Flash Evernote Password Manager Machine Learning Files Best Practice Content IBM Trending Congratulations GDPR E-Commerce nonprofits Thank You