window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Attempts to Make Smart Cities Hit a Snag

Attempts to Make Smart Cities Hit a Snag

At this point, the concept of the Internet of Things is a fairly familiar one, but that familiarity is to the Internet of Things on the micro scale--appliances with capabilities enhanced by an available connection to the Internet. There is another, more macro application to the Internet of Things: as a way to collect data in a municipal setting. However, like the IoT we are familiar with, these “smart cities” are host to many familiar problems.

The Concept of a Smart City
Like many technological developments, the idea of a smart city is built on good intentions. Through the use of technology (much of it based in the IoT), a smart city leverages collected data to functionally serve the public, embetter the services of government, and improve the quality of life for its citizenry.

That’s the idea, at least.

Unfortunately, like many of the ‘smart’ devices that the populace can interact with, the systems that these cities leverage tend to be susceptible to attack.

What These Attacks Could Do
In order to understand the potential ramifications of these kinds of attacks, it is important to first have an understanding of the kinds of systems that a smart city is built upon.

The true purpose behind creating a smart city is to make it a better place to live, and to do that, certain systems need to be put in place. These systems are powered by the data they collect. With that data, insights into correlated problems can be leveraged to solve them.

The sensors that these cities use to collect this data monitor a wide variety of factors, ranging from traffic conditions to the weather and even health-related factors like air quality and radiation. The data that is collected is then used, through the power of automation, to decide how to approach infrastructural concerns. For instance, if traffic is moving slowly in an area, these systems would deliver that data to decision-makers, allowing them to make the call to reroute traffic a different way to ease the congestion. This system just makes the decisions, too.

The big problem with this is that now, if these systems don’t have sufficient security measures in place, they leave the city’s infrastructure vulnerable to attack. Unfortunately, in an initial study of three companies who provide these kinds of smart city systems, 17 basic vulnerabilities were present in their products. These vulnerabilities included things like easily guessable passwords, bugs that could allow malware to be introduced, and opportunities for authentication requirements to be side-stepped.

Why This Matters
The harsh reality is that developing smart cities with these kinds of vulnerabilities is the geopolitical equivalent of intentionally wearing a “Kick Me” sign each and every time you went out in public. The United States of America have already learned this the hard way, as electoral systems and the energy grid have been hijacked recently. If appearances aren’t deceiving, actions are being taken to reinforce these vulnerabilities in these IoT devices, but it certainly doesn’t help if careless oversights are being made in the security of major metropolitan areas.

We’re not saying that bringing the Internet of Things to cities is a bad thing, but the security needs to be there. The same goes for businesses. If your business relies on devices that connect to the Internet, like physical security devices, smart appliances, and networking infrastructure, locking down these devices and keeping them patched is critical to keep your operations running without a hitch.

Give TaylorWorks a call at 407-478-6600 to learn about the security options we have to offer you.

Hackers Plus Artificial Intelligence Equals Big Tr...
Tip of the Week: Set Your System up with the Apps ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, January 18 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Cloud Best Practices Business Computing Data Backup Managed IT Services Privacy Hackers Hosted Solutions Malware Data Recovery VoIP Mobile Devices Email Data Outsourced IT Google Innovation User Tips Tech Term Backup Internet of Things Internet Microsoft Hardware Cloud Computing Business Continuity IT Services Saving Money Business BDR Software Communications Ransomware Communication Cybersecurity Efficiency Cybercrime Android Smartphones Smartphone IT Support Small Business Productivity Router Disaster Recovery Artificial Intelligence Managed IT Services Windows 10 Workplace Tips Chrome Network IT Support Browser Applications Business Management Law Enforcement Managed IT Phishing How To Computer Gadgets Access Control Blockchain Office 365 Business Intelligence Avoiding Downtime Save Money Computers Spam Mobile Device Management Virtualization Data Security Two-factor Authentication Server Data Protection Money Information Holiday BYOD Mobility Collaboration Mobile Device Word Windows Compliance Servers Miscellaneous Firewall Analysis Upgrade Social Media Vulnerability Remote Monitoring App Settings Facebook Training Redundancy Wi-Fi IT Management Connectivity Passwords Telephone Systems Voice over Internet Protocol Apps Automation Software as a Service Alert Encryption Machine Learning Productivity Managed Service Document Management Identity Theft Bandwidth Proactive IT Social Engineering Paperless Office Website Virtual Assistant Credit Cards Networking Update Smart Tech Unified Threat Management Botnet Employer-Employee Relationship Workers Google Drive Human Resources Telephone System Fraud Scam Flexibility Infrastructure OneNote Data loss Solid State Drive VPN Information Technology Mobile Computing Password Private Cloud Google Docs Data Breach Spam Blocking CES Sports Business Owner IT Plan File Sharing Windows 7 Education Bring Your Own Device Hacker Comparison Budget Value Operating System Keyboard Telephony Content Management Microsoft Office Unsupported Software Data Storage Big Data Work/Life Balance Users Windows 10s Proactive Skype Evernote PDF Leadership Save Time Microchip Software Tips Trending Health Office Tips Risk Management Recycling Cache Patch Management Project Management Technology Tips NIST Netflix Excel Millennials HaaS Google Apps Streaming Media GDPR Meetings eCommerce Authentication SaaS Remote Monitoring and Maintenance Start Menu Wireless Charging Students Physical Security Lifestyle Cleaning Smartwatch Flash eWaste Wireless Internet Wireless Current Events Virtual Reality Warranty Data Warehousing WiFi Insurance Cryptocurrency Tip of the week Workforce Content Filter Black Market Content Filtering E-Commerce Travel Windows 10 Social Fiber-Optic Nanotechnology Audit Instant Messaging Line of Business Mobile Hard Drives Staff Healthcare webinar Hacking Search Engine Computer Care HIPAA Amazon Criminal Wire Knowledge Worker Commute Printer Practices Safe Mode Windows Server 2008 Telecommuting Computing Infrastructure Password Manager Storage Battery Camera Screen Mirroring Accountants HVAC Emails Legal Entertainment Vendor Cables USB MSP Professional Services Digital Signature Electronic Health Records Augmented Reality Conferencing Bing HBO Samsung Remote Computing Sync Amazon Web Services Public Cloud Wireless Technology Network Congestion Mouse Hosted Computing Display Remote Work Business Mangement Downtime Cast Cortana Enterprise Content Management Charger Unified Communications Devices Marketing Computer Fan Recovery Remote Worker Tools The Internet of Things Data Management Help Desk Outlook Managed Service Provider Online Shopping Smart Office Electronic Medical Records IT Consultant Administrator Multi-Factor Security Inventory Business Technology Security Cameras Regulations End of Support Gmail Addiction Virtual Private Network Government IoT Password Management Specifications Theft Thought Leadership FENG Wiring Root Cause Analysis Strategy YouTube Shortcuts Frequently Asked Questions Loyalty Experience Employee/Employer Relationship Fun Internet exploMicrosoft Quick Tips Customer Service Mobile Office Company Culture Rootkit Content Music Domains Employer Employee Relationship Utility Computing Files Politics Advertising Office Colocation Managing Stress Audiobook Wearable Technology Public Speaking Computer Accessories History Video Games Regulation Search Presentation Two Factor Authentication Transportation Relocation Lithium-ion battery CrashOverride Books Vendor Management Assessment How to Bluetooth Automobile Techology Tech Support 5G Benefits Humor Internet Exlporer Twitter Safety Printers IBM Webinar Best Practice Television Troubleshooting User Error Scalability Hybrid Cloud Smart Technology Competition Emergency Customer Relationship Management IT solutions IP Address Public Computer Shadow IT Hosted Solution Hiring/Firing Worker

Mobile? Grab this Article!

QR-Code dieser Seite