window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Attempts to Make Smart Cities Hit a Snag

Attempts to Make Smart Cities Hit a Snag

At this point, the concept of the Internet of Things is a fairly familiar one, but that familiarity is to the Internet of Things on the micro scale--appliances with capabilities enhanced by an available connection to the Internet. There is another, more macro application to the Internet of Things: as a way to collect data in a municipal setting. However, like the IoT we are familiar with, these “smart cities” are host to many familiar problems.

The Concept of a Smart City
Like many technological developments, the idea of a smart city is built on good intentions. Through the use of technology (much of it based in the IoT), a smart city leverages collected data to functionally serve the public, embetter the services of government, and improve the quality of life for its citizenry.

That’s the idea, at least.

Unfortunately, like many of the ‘smart’ devices that the populace can interact with, the systems that these cities leverage tend to be susceptible to attack.

What These Attacks Could Do
In order to understand the potential ramifications of these kinds of attacks, it is important to first have an understanding of the kinds of systems that a smart city is built upon.

The true purpose behind creating a smart city is to make it a better place to live, and to do that, certain systems need to be put in place. These systems are powered by the data they collect. With that data, insights into correlated problems can be leveraged to solve them.

The sensors that these cities use to collect this data monitor a wide variety of factors, ranging from traffic conditions to the weather and even health-related factors like air quality and radiation. The data that is collected is then used, through the power of automation, to decide how to approach infrastructural concerns. For instance, if traffic is moving slowly in an area, these systems would deliver that data to decision-makers, allowing them to make the call to reroute traffic a different way to ease the congestion. This system just makes the decisions, too.

The big problem with this is that now, if these systems don’t have sufficient security measures in place, they leave the city’s infrastructure vulnerable to attack. Unfortunately, in an initial study of three companies who provide these kinds of smart city systems, 17 basic vulnerabilities were present in their products. These vulnerabilities included things like easily guessable passwords, bugs that could allow malware to be introduced, and opportunities for authentication requirements to be side-stepped.

Why This Matters
The harsh reality is that developing smart cities with these kinds of vulnerabilities is the geopolitical equivalent of intentionally wearing a “Kick Me” sign each and every time you went out in public. The United States of America have already learned this the hard way, as electoral systems and the energy grid have been hijacked recently. If appearances aren’t deceiving, actions are being taken to reinforce these vulnerabilities in these IoT devices, but it certainly doesn’t help if careless oversights are being made in the security of major metropolitan areas.

We’re not saying that bringing the Internet of Things to cities is a bad thing, but the security needs to be there. The same goes for businesses. If your business relies on devices that connect to the Internet, like physical security devices, smart appliances, and networking infrastructure, locking down these devices and keeping them patched is critical to keep your operations running without a hitch.

Give TaylorWorks a call at 407-478-6600 to learn about the security options we have to offer you.

Hackers Plus Artificial Intelligence Equals Big Tr...
Tip of the Week: Set Your System up with the Apps ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, November 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Best Practices Cloud Business Computing Managed IT Services Privacy Data Backup Hackers Email Data Recovery Malware VoIP Hosted Solutions Data Mobile Devices Outsourced IT Innovation Tech Term Google Internet Microsoft Backup Hardware Cloud Computing Business Continuity BDR Software User Tips Saving Money Business Internet of Things Communications IT Services Cybersecurity Ransomware IT Support Communication Small Business Cybercrime Efficiency Android Managed IT Services Smartphones Chrome Network Applications Disaster Recovery Productivity Artificial Intelligence Browser Workplace Tips Computer How To Router Law Enforcement Gadgets Managed IT IT Support Business Management Windows 10 Smartphone Information Server Money Two-factor Authentication Data Security Collaboration BYOD Windows Data Protection Save Money Computers Avoiding Downtime Business Intelligence Virtualization Blockchain Spam Mobile Device Management Phishing Mobility Training Document Management Passwords Redundancy IT Management Alert Compliance Apps Connectivity Productivity Social Engineering Firewall Encryption Identity Theft Bandwidth Office 365 Proactive IT App Word Miscellaneous Remote Monitoring Upgrade Facebook Social Media Servers Analysis Vulnerability Telephone Systems Fraud Holiday Education Bring Your Own Device Settings OneNote Data loss Wi-Fi VPN Infrastructure Keyboard Mobile Computing Managed Service Mobile Device Work/Life Balance Data Breach Spam Blocking IT Plan Voice over Internet Protocol Windows 7 Budget Virtual Assistant File Sharing Automation Microsoft Office CES Sports Comparison Value Scam Operating System Unsupported Software Big Data Machine Learning Telephone System Data Storage Website Employer-Employee Relationship Content Management Credit Cards Flexibility Access Control Networking Update Solid State Drive Paperless Office Unified Threat Management Password Smart Tech Information Technology Workers Business Owner Private Cloud Flash Computing Infrastructure Authentication Current Events Data Warehousing WiFi Mouse Human Resources Students Cleaning Workforce Insurance Cryptocurrency Data Management Travel eWaste Wireless Internet Recovery Tip of the week Audit Mobile Public Cloud Remote Worker Content Filter webinar Help Desk Amazon Fiber-Optic Nanotechnology Knowledge Google Docs Augmented Reality Cortana Administrator Staff Healthcare Computer Care Windows Server 2008 Telecommuting Business Technology Practices Safe Mode Screen Mirroring Wireless Technology Virtual Private Network Criminal Wire Emails Accountants HVAC Save Time Professional Services Managed Service Provider Wiring Password Manager Storage Conferencing HBO Marketing Sync Hacker Amazon Web Services End of Support Proactive Cables Risk Management Network Congestion The Internet of Things Microchip Digital Signature Electronic Health Records Samsung Patch Management Remote Work Hosted Computing Downtime Cast Software as a Service Project Management Charger Enterprise Content Management Computer Fan Tools PDF GDPR Business Mangement Outlook Health Office Tips Virtual Reality Telephony Online Shopping Remote Monitoring and Maintenance Unified Communications Devices Electronic Medical Records IT Consultant Multi-Factor Security Technology Tips Users Regulations HaaS Inventory Government Warranty Smart Office Black Market Content Filtering IoT Password Management Hacking FENG Root Cause Analysis Google Drive E-Commerce Gmail Addiction Instant Messaging Frequently Asked Questions Specifications Worker Commute Windows 10s Skype Evernote Line of Business Theft Thought Leadership HIPAA Leadership Software Tips Trending Search Engine Strategy YouTube Legal Entertainment Printer Battery Netflix NIST Meetings Botnet Wireless Hard Drives Camera Recycling Cache USB Excel Millennials SaaS Start Menu Wireless Charging MSP Google Apps Streaming Media Remote Computing Physical Security Windows 10 Lifestyle Bing Best Practice Public Speaking Techology Presentation Printers Troubleshooting Managing Stress Smart Technology Lithium-ion battery Scalability Computer Accessories Humor Internet Exlporer Two Factor Authentication Emergency Tech Support User Error CrashOverride 5G Shadow IT Vendor Management Hosted Solution Assessment Safety Hybrid Cloud Bluetooth Experience IBM Content Hiring/Firing Webinar Television Competition Twitter Music Customer Relationship Management IP Address Fun Internet exploMicrosoft Politics Quick Tips Utility Computing Audiobook IT solutions Public Computer Worker Wearable Technology Customer Service Files Loyalty Transportation Mobile Office Advertising Video Games Office Colocation Regulation Domains Books History Automobile How to Rootkit Company Culture Benefits Search Employer Employee Relationship Relocation

Mobile? Grab this Article!

QR-Code dieser Seite