Female Rep1


 "99% Positive Customer Satisfaction Rate"

Have IT Questions?
Call us now (888) 894-6411


Attempts to Make Smart Cities Hit a Snag

Attempts to Make Smart Cities Hit a Snag

At this point, the concept of the Internet of Things is a fairly familiar one, but that familiarity is to the Internet of Things on the micro scale--appliances with capabilities enhanced by an available connection to the Internet. There is another, more macro application to the Internet of Things: as a way to collect data in a municipal setting. However, like the IoT we are familiar with, these “smart cities” are host to many familiar problems.

The Concept of a Smart City
Like many technological developments, the idea of a smart city is built on good intentions. Through the use of technology (much of it based in the IoT), a smart city leverages collected data to functionally serve the public, embetter the services of government, and improve the quality of life for its citizenry.

That’s the idea, at least.

Unfortunately, like many of the ‘smart’ devices that the populace can interact with, the systems that these cities leverage tend to be susceptible to attack.

What These Attacks Could Do
In order to understand the potential ramifications of these kinds of attacks, it is important to first have an understanding of the kinds of systems that a smart city is built upon.

The true purpose behind creating a smart city is to make it a better place to live, and to do that, certain systems need to be put in place. These systems are powered by the data they collect. With that data, insights into correlated problems can be leveraged to solve them.

The sensors that these cities use to collect this data monitor a wide variety of factors, ranging from traffic conditions to the weather and even health-related factors like air quality and radiation. The data that is collected is then used, through the power of automation, to decide how to approach infrastructural concerns. For instance, if traffic is moving slowly in an area, these systems would deliver that data to decision-makers, allowing them to make the call to reroute traffic a different way to ease the congestion. This system just makes the decisions, too.

The big problem with this is that now, if these systems don’t have sufficient security measures in place, they leave the city’s infrastructure vulnerable to attack. Unfortunately, in an initial study of three companies who provide these kinds of smart city systems, 17 basic vulnerabilities were present in their products. These vulnerabilities included things like easily guessable passwords, bugs that could allow malware to be introduced, and opportunities for authentication requirements to be side-stepped.

Why This Matters
The harsh reality is that developing smart cities with these kinds of vulnerabilities is the geopolitical equivalent of intentionally wearing a “Kick Me” sign each and every time you went out in public. The United States of America have already learned this the hard way, as electoral systems and the energy grid have been hijacked recently. If appearances aren’t deceiving, actions are being taken to reinforce these vulnerabilities in these IoT devices, but it certainly doesn’t help if careless oversights are being made in the security of major metropolitan areas.

We’re not saying that bringing the Internet of Things to cities is a bad thing, but the security needs to be there. The same goes for businesses. If your business relies on devices that connect to the Internet, like physical security devices, smart appliances, and networking infrastructure, locking down these devices and keeping them patched is critical to keep your operations running without a hitch.

Give TWINTEL Solutions a call at (888) 894-6411 to learn about the security options we have to offer you.

Hackers Plus Artificial Intelligence Equals Big Tr...
Tip of the Week: Set Your System up with the Apps ...

Related Posts



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, September 21 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!


Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Technology Business Computing Hackers Network Security Backup Malware Hosted Solutions Mobile Devices Microsoft VoIP Google bgc Disaster Recovery roundup Software Email nonprofit Data Managed IT Services Alert Innovation Internet Business Business Continuity Outsourced IT Smartphones Tech Term communications Windows 10 Hardware IT Services Saving Money Ransomware Managed IT Services Server Android Data Backup Browser Cybercrime Computer Small Business Cloud Computing Efficiency Internet of Things IT Support Computers Save Money Smartphone Business Management Productivity Quick Tips User Tips Network Windows BDR Passwords Data Recovery Office Miscellaneous Mobile Device Management Applications Artificial Intelligence Money Telephone Systems Managed IT BYOD Social Engineering Cybersecurity Communication IT Support Recovery Work/Life Balance Gadgets Phishing Upgrade Law Enforcement Virtualization Hacking Facebook Workplace Tips Collaboration Vulnerability Productivity Firewall Mobility Social Media Wi-Fi Chrome Private Cloud Bandwidth Password Bring Your Own Device Holiday Office 365 Remote Monitoring Windows 10 Two-factor Authentication Router Automation Office Tips Managed Service Provider Avoiding Downtime Data Protection Budget Flexibility VPN How To Health App Proactive IT Compliance Microsoft Office Identity Theft Google Drive Data Breach Information Technology Business Intelligence Sports History Word Mobile Computing Black Market HaaS Operating System Safety Connectivity Value Apps Redundancy Mobile Device Remote Computing Data Security Government Servers Blockchain Virtual Assistant PDF IT Plan SaaS Computing Infrastructure Update Business Owner Hiring/Firing Solid State Drive Cleaning Emergency Marketing Big Data Training Workers Credit Cards Document Management Computer Care Infrastructure Paperless Office Patch Management Physical Security Legal Windows 7 HIPAA Wireless Technology OneNote Save Time YouTube Samsung Spam Risk Management Charger Settings Information Scam Unsupported Software CES End of Support Data Storage Website Automobile Data storage Electronic Medical Records Encryption Managed Service USB Content Management IT Management Data Management Worker Keyboard The Internet of Things Employer-Employee Relationship Unified Threat Management Spam Blocking Battery Content Filtering Comparison Entertainment Online Shopping Troubleshooting Chromecast Customers Multi-Factor Security Thought Leadership Laptop Rootkit Scalability Experience Recycling Enterprise Content Management FENG Data loss Authentication Relocation Tip of the week Windows 10s Files Tools Theft Education File Sharing Smart Technology Network Congestion HBO Specifications Google Apps Smart Office Flash Evernote Human Resources Telephone System Trending Twitter Touchpad Windows Server 2008 eWaste Password Management NarrowBand Hacker Screen Mirroring WiFi Techology Nanotechnology Camera Employer Employee Relationship webinar Humor Public Cloud Practices Augmented Reality Two Factor Authentication Outlook Millennials Apple Sync Wireless Charging Shadow IT Books Staff Regulation IBM Data Warehousing Lifestyle Addiction Vendor Management Fraud Instant Messaging Criminal NIST Assessment Internet Exlporer Cast Google Docs Smart Tech Going Green Computer Accessories Conferencing Machine Learning Mobile Users Hosted Computing Remote Worker IT Consultant Workforce Password Manager iPhone Telephony Fiber-Optic Hosted Solution Digital Signature Supercomputer Best Practice Content Cache Regulations Amazon Search Cryptocurrency Television CrashOverride Bluetooth Netflix Politics Business Mangement HVAC Audit User Error Professional Services Virtual Reality Inventory Wiring Leadership Frequently Asked Questions Telecommuting Downtime Skype Cables Transportation Current Events Wireless Software Tips Audiobook Wireless Internet Amazon Web Services How to Safe Mode Public Computer Reputation Advertising Voice over Internet Protocol Devices Gmail Networking Loyalty Computer Fan Monitor Colocation Meetings Software as a Service Worker Commute Access Control Hard Drives Excel Remote Work Robot Start Menu Unified Communications Accountants MSP Benefits Knowledge Video Games Cortana Wire E-Commerce nonprofits Printers Thank You Congratulations GDPR