window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Attempts to Make Smart Cities Hit a Snag

Attempts to Make Smart Cities Hit a Snag

At this point, the concept of the Internet of Things is a fairly familiar one, but that familiarity is to the Internet of Things on the micro scale--appliances with capabilities enhanced by an available connection to the Internet. There is another, more macro application to the Internet of Things: as a way to collect data in a municipal setting. However, like the IoT we are familiar with, these “smart cities” are host to many familiar problems.

The Concept of a Smart City
Like many technological developments, the idea of a smart city is built on good intentions. Through the use of technology (much of it based in the IoT), a smart city leverages collected data to functionally serve the public, embetter the services of government, and improve the quality of life for its citizenry.

That’s the idea, at least.

Unfortunately, like many of the ‘smart’ devices that the populace can interact with, the systems that these cities leverage tend to be susceptible to attack.

What These Attacks Could Do
In order to understand the potential ramifications of these kinds of attacks, it is important to first have an understanding of the kinds of systems that a smart city is built upon.

The true purpose behind creating a smart city is to make it a better place to live, and to do that, certain systems need to be put in place. These systems are powered by the data they collect. With that data, insights into correlated problems can be leveraged to solve them.

The sensors that these cities use to collect this data monitor a wide variety of factors, ranging from traffic conditions to the weather and even health-related factors like air quality and radiation. The data that is collected is then used, through the power of automation, to decide how to approach infrastructural concerns. For instance, if traffic is moving slowly in an area, these systems would deliver that data to decision-makers, allowing them to make the call to reroute traffic a different way to ease the congestion. This system just makes the decisions, too.

The big problem with this is that now, if these systems don’t have sufficient security measures in place, they leave the city’s infrastructure vulnerable to attack. Unfortunately, in an initial study of three companies who provide these kinds of smart city systems, 17 basic vulnerabilities were present in their products. These vulnerabilities included things like easily guessable passwords, bugs that could allow malware to be introduced, and opportunities for authentication requirements to be side-stepped.

Why This Matters
The harsh reality is that developing smart cities with these kinds of vulnerabilities is the geopolitical equivalent of intentionally wearing a “Kick Me” sign each and every time you went out in public. The United States of America have already learned this the hard way, as electoral systems and the energy grid have been hijacked recently. If appearances aren’t deceiving, actions are being taken to reinforce these vulnerabilities in these IoT devices, but it certainly doesn’t help if careless oversights are being made in the security of major metropolitan areas.

We’re not saying that bringing the Internet of Things to cities is a bad thing, but the security needs to be there. The same goes for businesses. If your business relies on devices that connect to the Internet, like physical security devices, smart appliances, and networking infrastructure, locking down these devices and keeping them patched is critical to keep your operations running without a hitch.

Give TaylorWorks a call at 407-478-6600 to learn about the security options we have to offer you.

Hackers Plus Artificial Intelligence Equals Big Tr...
Tip of the Week: Set Your System up with the Apps ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, September 19 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Cloud Best Practices Managed IT Services Privacy Business Computing Hackers Data Backup Email Malware Hosted Solutions VoIP Mobile Devices Outsourced IT Data Recovery Data Innovation Google Backup Tech Term Microsoft Software Internet of Things Cloud Computing Saving Money Internet Business Continuity Efficiency Small Business Ransomware IT Services BDR IT Support Hardware Cybersecurity Android Communication Disaster Recovery Artificial Intelligence Communications User Tips Smartphones Applications Cybercrime Managed IT Services Gadgets How To Business Network Law Enforcement Router Managed IT Save Money Data Protection Business Management Computers Windows 10 Phishing Browser Avoiding Downtime Chrome Business Intelligence Virtualization Smartphone Productivity Collaboration Windows Mobile Device Management Money Data Security IT Support Two-factor Authentication BYOD Passwords Workplace Tips Analysis Social Engineering Apps Productivity Vulnerability Identity Theft Remote Monitoring Training App Word Telephone Systems Office 365 Facebook Connectivity Mobility Social Media Document Management Spam Compliance IT Management Alert Redundancy Bandwidth Blockchain Proactive IT Computer Firewall Smart Tech IT Plan Networking Windows 7 Unified Threat Management Comparison Workers Information Budget Unsupported Software Infrastructure Microsoft Office VPN Data Storage Employer-Employee Relationship Settings OneNote Big Data Business Owner Managed Service Website Education Bring Your Own Device Flexibility Update Holiday Miscellaneous Solid State Drive Servers Credit Cards File Sharing Data Breach Information Technology CES Sports Upgrade Password Private Cloud Virtual Assistant Mobile Device Server Encryption Machine Learning Spam Blocking Data loss Automation Work/Life Balance Content Management Mobile Computing Wi-Fi Value Operating System Access Control Paperless Office NIST FENG Line of Business Managed Service Provider HBO Recycling Cache Augmented Reality Professional Services Windows 10s Virtual Reality Scam End of Support Voice over Internet Protocol Google Apps Streaming Media Leadership Wireless Technology Sync Amazon Web Services Cast Software as a Service Authentication Remote Work Human Resources Students Netflix Black Market Content Filtering Insurance Cryptocurrency Marketing Hacking MSP Hacker PDF Outlook eWaste Wireless Internet Instant Messaging The Internet of Things Health Office Tips Tools SaaS Worker Commute Multi-Factor Security Content Filter HIPAA Technology Tips Telephony Online Shopping HaaS Government Fiber-Optic Nanotechnology Current Events Legal Entertainment Regulations Staff Healthcare Cleaning Battery Practices Safe Mode Remote Worker Google Drive Frequently Asked Questions Specifications Criminal Wire USB Root Cause Analysis Audit Users Software Tips Trending Password Manager Storage webinar Remote Computing Skype Evernote Accountants HVAC Business Technology Cables Knowledge Digital Signature Electronic Health Records Computer Care Botnet Hosted Computing Data Management Wiring Hard Drives Excel Millennials Emails Recovery Meetings Enterprise Content Management Proactive Physical Security Lifestyle Business Mangement Conferencing Keyboard Start Menu Wireless Charging Computing Infrastructure Data Warehousing Unified Communications Devices Network Congestion Wireless Flash Fraud Samsung Travel Inventory Downtime GDPR Tip of the week Workforce Smart Office Charger Windows 10 IoT Password Management Computer Fan Save Time Remote Monitoring and Maintenance Public Cloud Gmail Addiction Mobile Telephone System Patch Management Google Docs Theft Thought Leadership Electronic Medical Records IT Consultant Risk Management Cortana Amazon Strategy YouTube Screen Mirroring E-Commerce Windows Server 2008 Telecommuting Public Computer Hybrid Cloud Worker Music Loyalty Regulation Tech Support Politics 5G Company Culture Audiobook Camera Safety Hiring/Firing IBM Rootkit Wearable Technology Transportation Fun Internet exploMicrosoft Employer Employee Relationship Video Games Quick Tips Managing Stress Competition Printers Customer Relationship Management Books Automobile IP Address How to Files Benefits Advertising Computer Accessories Office Customer Service Colocation Two Factor Authentication Best Practice CrashOverride Mobile Office Vendor Management Troubleshooting History Assessment Smart Technology Search Twitter Bluetooth Scalability Domains Relocation Emergency WiFi Webinar Shadow IT Hosted Solution Techology Television Public Speaking Experience Humor Internet Exlporer Presentation Content Lithium-ion battery IT solutions User Error

Mobile? Grab this Article!

QR-Code dieser Seite