window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//cdn.mouseflow.com/projects/0148bb62-7ff8-46ae-a466-bf3fd13c7d09.js"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Attempts to Make Smart Cities Hit a Snag

Attempts to Make Smart Cities Hit a Snag

At this point, the concept of the Internet of Things is a fairly familiar one, but that familiarity is to the Internet of Things on the micro scale--appliances with capabilities enhanced by an available connection to the Internet. There is another, more macro application to the Internet of Things: as a way to collect data in a municipal setting. However, like the IoT we are familiar with, these “smart cities” are host to many familiar problems.

The Concept of a Smart City
Like many technological developments, the idea of a smart city is built on good intentions. Through the use of technology (much of it based in the IoT), a smart city leverages collected data to functionally serve the public, embetter the services of government, and improve the quality of life for its citizenry.

That’s the idea, at least.

Unfortunately, like many of the ‘smart’ devices that the populace can interact with, the systems that these cities leverage tend to be susceptible to attack.

What These Attacks Could Do
In order to understand the potential ramifications of these kinds of attacks, it is important to first have an understanding of the kinds of systems that a smart city is built upon.

The true purpose behind creating a smart city is to make it a better place to live, and to do that, certain systems need to be put in place. These systems are powered by the data they collect. With that data, insights into correlated problems can be leveraged to solve them.

The sensors that these cities use to collect this data monitor a wide variety of factors, ranging from traffic conditions to the weather and even health-related factors like air quality and radiation. The data that is collected is then used, through the power of automation, to decide how to approach infrastructural concerns. For instance, if traffic is moving slowly in an area, these systems would deliver that data to decision-makers, allowing them to make the call to reroute traffic a different way to ease the congestion. This system just makes the decisions, too.

The big problem with this is that now, if these systems don’t have sufficient security measures in place, they leave the city’s infrastructure vulnerable to attack. Unfortunately, in an initial study of three companies who provide these kinds of smart city systems, 17 basic vulnerabilities were present in their products. These vulnerabilities included things like easily guessable passwords, bugs that could allow malware to be introduced, and opportunities for authentication requirements to be side-stepped.

Why This Matters
The harsh reality is that developing smart cities with these kinds of vulnerabilities is the geopolitical equivalent of intentionally wearing a “Kick Me” sign each and every time you went out in public. The United States of America have already learned this the hard way, as electoral systems and the energy grid have been hijacked recently. If appearances aren’t deceiving, actions are being taken to reinforce these vulnerabilities in these IoT devices, but it certainly doesn’t help if careless oversights are being made in the security of major metropolitan areas.

We’re not saying that bringing the Internet of Things to cities is a bad thing, but the security needs to be there. The same goes for businesses. If your business relies on devices that connect to the Internet, like physical security devices, smart appliances, and networking infrastructure, locking down these devices and keeping them patched is critical to keep your operations running without a hitch.

Give TaylorWorks a call at 407-478-6600 to learn about the security options we have to offer you.

Hackers Plus Artificial Intelligence Equals Big Tr...
Tip of the Week: Set Your System up with the Apps ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, April 20 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Best Practices Cloud Business Computing Privacy Data Backup Hosted Solutions Managed IT Services Malware Hackers Data Recovery Email Productivity Internet VoIP Mobile Devices Data User Tips Google Innovation Communications Internet of Things Outsourced IT Tech Term Microsoft Backup Cloud Computing Efficiency IT Services Hardware Cybersecurity Software Business Continuity Workplace Tips Saving Money Business Artificial Intelligence Smartphones BDR Communication Small Business Business Management Android Ransomware Router Disaster Recovery IT Support Managed IT Services Smartphone IT Support Windows 10 Phishing Cybercrime Network Chrome Collaboration Applications Gadgets Browser Training Managed IT How To Encryption Computer Mobile Device Windows Server Law Enforcement Office 365 Save Money BYOD Data Protection Computers Social Media Spam Mobile Device Management Word Two-factor Authentication Avoiding Downtime Business Intelligence Holiday Passwords Blockchain Proactive IT Access Control Mobility Virtualization Money Data Security Information Alert Firewall Miscellaneous Managed Service Upgrade Connectivity Voice over Internet Protocol Business Technology Software as a Service File Sharing Social Engineering Machine Learning Automation Identity Theft Wi-Fi App Remote Monitoring Telephone Systems Operating System Bandwidth Paperless Office Servers Education Facebook Document Management Apps Analysis Productivity Private Cloud Compliance Vulnerability IT Management Settings Redundancy OneNote Users Website Virtual Private Network IT Plan Scam Data Breach CES Sports Windows 7 Comparison Wireless Manufacturing Unsupported Software Spam Blocking Virtual Assistant Telephony Health Data Storage Content Management Employer-Employee Relationship Business Owner Remote Computing Google Drive Value Telephone System Augmented Reality Update Credit Cards Bring Your Own Device Meetings Botnet Flexibility Solid State Drive Smart Tech Password Information Technology Keyboard Networking Human Resources Hacker Unified Threat Management Fraud Data loss Work/Life Balance Budget Workers Microsoft Office Cryptocurrency Save Time Infrastructure Mobile Computing VPN Big Data Google Docs Staff Healthcare Display Remote Worker Restore Data Screen Mirroring Criminal Wire Help Desk Windows Server 2008 Telecommuting Cortana Practices Safe Mode Professional Services Password Manager Storage webinar Administrator HBO Accountants HVAC Audit Google Search Cables Knowledge Logistics Managed Service Provider Digital Signature Electronic Health Records Computer Care Security Cameras Sync Amazon Web Services Virtual Reality Wiring Backup and Disaster Recovery Cast End of Support Vendor Management Emails Shortcuts Remote Work Black Market Content Filtering Hosted Computing Tools Hacking Business Mangement Conferencing Microchip Outlook Instant Messaging Enterprise Content Management Proactive Net Neutrality Office Tips Unified Communications Windows 10 Devices Network Congestion Project Management Multi-Factor Security PDF HIPAA Samsung Employee/Employer Relationship Online Shopping Worker Commute Downtime GDPR Cryptomining Government Legal Entertainment Smart Office Charger eCommerce Regulations Technology Tips Battery Quick Tips Inventory Root Cause Analysis HaaS Gmail Addiction Frequently Asked Questions Specifications USB IoT Password Management Computer Fan Remote Monitoring and Maintenance ISP Theft Thought Leadership Electronic Medical Records IT Consultant Warranty Biometric Security Software Tips Trending Strategy YouTube Smartwatch Skype Evernote E-Commerce Database Social File Versioning Data Management Recycling Cache Search Engine Excel Millennials Recovery Wireless Technology 5G NIST FENG Line of Business Google Apps Streaming Media Leadership Printer OLED Physical Security Lifestyle Hard Drives Windows 10s Employee Start Menu Wireless Charging The Internet of Things Authentication Camera Data Warehousing WiFi Marketing Students Netflix Vendor Flash MSP Multiple Versions Travel Computing Infrastructure eWaste Wireless Internet Bing Tip of the week Workforce Insurance Content Filter Mouse SaaS Digital Signage Mobile Fiber-Optic Nanotechnology Current Events Distribution Public Cloud Risk Management Cleaning Amazon Patch Management Internet Exlporer Content User Error Customer Service Computer Accessories Music Two Factor Authentication Hybrid Cloud Politics Mobile Office CrashOverride Audiobook Domains Twitter Bluetooth Hiring/Firing Wearable Technology Assessment Transportation Video Games Fun Internet exploMicrosoft Webinar Books Public Speaking Automobile Utility Computing How to Presentation Television Files Benefits Lithium-ion battery Best Practice Advertising IT solutions Office Colocation Tech Support Worker Troubleshooting Public Computer History Smart Technology IBM Scalability Safety Company Culture Loyalty Regulation Analytics Search Relocation Emergency Rootkit Shadow IT Hosted Solution Techology Customer Relationship Management Employer Employee Relationship Experience Competition Managing Stress Printers IP Address Humor

Mobile? Grab this Article!

QR-Code dieser Seite