shutterstock 6840 TEST SIZE V1 051116


 "Experienced Analysts are ready to help you."

Have IT Questions?
Call us now (888) 894-6411

TWINTEL Solutions Blog

Attempts to Make Smart Cities Hit a Snag

Attempts to Make Smart Cities Hit a Snag

At this point, the concept of the Internet of Things is a fairly familiar one, but that familiarity is to the Internet of Things on the micro scale--appliances with capabilities enhanced by an available connection to the Internet. There is another, more macro application to the Internet of Things: as a way to collect data in a municipal setting. However, like the IoT we are familiar with, these “smart cities” are host to many familiar problems.

The Concept of a Smart City
Like many technological developments, the idea of a smart city is built on good intentions. Through the use of technology (much of it based in the IoT), a smart city leverages collected data to functionally serve the public, embetter the services of government, and improve the quality of life for its citizenry.

That’s the idea, at least.

Unfortunately, like many of the ‘smart’ devices that the populace can interact with, the systems that these cities leverage tend to be susceptible to attack.

What These Attacks Could Do
In order to understand the potential ramifications of these kinds of attacks, it is important to first have an understanding of the kinds of systems that a smart city is built upon.

The true purpose behind creating a smart city is to make it a better place to live, and to do that, certain systems need to be put in place. These systems are powered by the data they collect. With that data, insights into correlated problems can be leveraged to solve them.

The sensors that these cities use to collect this data monitor a wide variety of factors, ranging from traffic conditions to the weather and even health-related factors like air quality and radiation. The data that is collected is then used, through the power of automation, to decide how to approach infrastructural concerns. For instance, if traffic is moving slowly in an area, these systems would deliver that data to decision-makers, allowing them to make the call to reroute traffic a different way to ease the congestion. This system just makes the decisions, too.

The big problem with this is that now, if these systems don’t have sufficient security measures in place, they leave the city’s infrastructure vulnerable to attack. Unfortunately, in an initial study of three companies who provide these kinds of smart city systems, 17 basic vulnerabilities were present in their products. These vulnerabilities included things like easily guessable passwords, bugs that could allow malware to be introduced, and opportunities for authentication requirements to be side-stepped.

Why This Matters
The harsh reality is that developing smart cities with these kinds of vulnerabilities is the geopolitical equivalent of intentionally wearing a “Kick Me” sign each and every time you went out in public. The United States of America have already learned this the hard way, as electoral systems and the energy grid have been hijacked recently. If appearances aren’t deceiving, actions are being taken to reinforce these vulnerabilities in these IoT devices, but it certainly doesn’t help if careless oversights are being made in the security of major metropolitan areas.

We’re not saying that bringing the Internet of Things to cities is a bad thing, but the security needs to be there. The same goes for businesses. If your business relies on devices that connect to the Internet, like physical security devices, smart appliances, and networking infrastructure, locking down these devices and keeping them patched is critical to keep your operations running without a hitch.

Give TWINTEL Solutions a call at (888) 894-6411 to learn about the security options we have to offer you.

Hackers Plus Artificial Intelligence Equals Big Tr...
Tip of the Week: Set Your System up with the Apps ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, February 20 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!


Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Business Computing Hackers Network Security Hosted Solutions Backup Malware Mobile Devices Google Data VoIP Microsoft Disaster Recovery Business Business Continuity bgc communications roundup Email nonprofit Internet Software Alert User Tips IT Services Innovation Outsourced IT Managed IT Services Hardware Smartphones Data Backup Productivity Tech Term Windows 10 Browser Managed IT Services Server Cloud Computing Saving Money Data Recovery Smartphone Efficiency Ransomware Computer Android Workplace Tips Cybercrime IT Support Internet of Things Business Management Small Business Communication Network BDR Computers IT Support Office Productivity Miscellaneous Windows Quick Tips Artificial Intelligence Passwords Cybersecurity Save Money Holiday Windows 10 Applications Telephone Systems BYOD Managed IT Router Mobile Device Recovery Money Social Engineering Mobility Chrome Gadgets Mobile Device Management Office 365 Social Media Virtualization Automation Collaboration Upgrade Law Enforcement Hacking Vulnerability Facebook Proactive IT Firewall Private Cloud Health Wi-Fi Phishing Work/Life Balance Password Data Protection Information Microsoft Office Remote Monitoring Two-factor Authentication Managed Service Provider Google Drive Budget VPN Flexibility Office Tips How To Avoiding Downtime Compliance Word App Bring Your Own Device Bandwidth Sports Spam Data Breach Mobile Computing Connectivity Voice over Internet Protocol Encryption Managed Service Software as a Service Safety Information Technology HaaS Save Time Scam Data Security Settings History Servers Black Market Identity Theft Value Business Intelligence Apps Operating System Remote Computing Keyboard Redundancy Business Owner Cleaning Telephony Machine Learning Unsupported Software Emergency Training Workers Data Storage Website Big Data Government CES PDF Document Management Computer Care Solid State Drive Patch Management Computing Infrastructure Wireless Technology Legal OneNote IT Management YouTube Marketing HIPAA Content Management Samsung Risk Management Hacker Comparison Access Control Charger IT Plan Update Blockchain Virtual Assistant Electronic Medical Records Physical Security Automobile Worker The Internet of Things WiFi USB Human Resources Telephone System Employer-Employee Relationship Credit Cards Data Management End of Support Unified Threat Management Spam Blocking Entertainment Infrastructure Paperless Office Data storage Battery Content Filtering SaaS Google Docs Hiring/Firing Windows 7 Fraud Mobile Scalability Social Experience Criminal NIST Smart Technology Network Congestion Touchpad Reputation Advertising Workforce Smart Tech Printers Windows 10s Fiber-Optic Microchip Password Manager Monitor Colocation Education Hosted Computing Remote Worker NarrowBand Hard Drives Cache Robot Employee Digital Signature Employer Employee Relationship webinar Regulations Amazon Professional Services Vendor Cryptocurrency Two Factor Authentication Customers Frequently Asked Questions Telecommuting Techology Warranty Public Cloud Skype Cables Search Engine Business Mangement HVAC IBM Going Green Software Tips Inventory Wiring Vendor Management Relocation Wireless Internet Assessment Files Shadow IT Digital Signage Books Computer Accessories Conferencing Amazon Web Services Meetings Instant Messaging Display Safe Mode IT Consultant Excel Remote Work Devices Printer Humor Start Menu Unified Communications Bing Gmail Networking Supercomputer Users Best Practice Content Cortana Wire Television CrashOverride Multi-Factor Security Google Search Hosted Solution Accountants MSP Bluetooth Netflix Online Shopping Audit Apple Data loss Search Security Cameras Leadership Tip of the week Thought Leadership Mouse Tools Theft Help Desk Politics Recycling Enterprise Content Management Transportation Current Events Internet Exlporer HBO Specifications Virtual Reality Authentication Audiobook Google Apps Smart Office Public Computer Trending Net Neutrality File Sharing Flash Evernote Administrator Loyalty Computer Fan iPhone Screen Mirroring How to Botnet Windows Server 2008 Twitter Shortcuts eWaste Password Management Benefits Knowledge Laptop Outlook Millennials Worker Commute Nanotechnology Camera Chromecast Wireless Charging Video Games User Error Data Warehousing Lifestyle ISP Practices Augmented Reality Rootkit Sync Addiction FENG Downtime Cast Smartwatch Troubleshooting Staff Regulation Wireless nonprofits GDPR Thank You E-Commerce Congratulations