Contact us today!

Professional Computer Associates Blog

Attempts to Make Smart Cities Hit a Snag

Attempts to Make Smart Cities Hit a Snag

At this point, the concept of the Internet of Things is a fairly familiar one, but that familiarity is to the Internet of Things on the micro scale--appliances with capabilities enhanced by an available connection to the Internet. There is another, more macro application to the Internet of Things: as a way to collect data in a municipal setting. However, like the IoT we are familiar with, these “smart cities” are host to many familiar problems.

The Concept of a Smart City
Like many technological developments, the idea of a smart city is built on good intentions. Through the use of technology (much of it based in the IoT), a smart city leverages collected data to functionally serve the public, embetter the services of government, and improve the quality of life for its citizenry.

That’s the idea, at least.

Unfortunately, like many of the ‘smart’ devices that the populace can interact with, the systems that these cities leverage tend to be susceptible to attack.

What These Attacks Could Do
In order to understand the potential ramifications of these kinds of attacks, it is important to first have an understanding of the kinds of systems that a smart city is built upon.

The true purpose behind creating a smart city is to make it a better place to live, and to do that, certain systems need to be put in place. These systems are powered by the data they collect. With that data, insights into correlated problems can be leveraged to solve them.

The sensors that these cities use to collect this data monitor a wide variety of factors, ranging from traffic conditions to the weather and even health-related factors like air quality and radiation. The data that is collected is then used, through the power of automation, to decide how to approach infrastructural concerns. For instance, if traffic is moving slowly in an area, these systems would deliver that data to decision-makers, allowing them to make the call to reroute traffic a different way to ease the congestion. This system just makes the decisions, too.

The big problem with this is that now, if these systems don’t have sufficient security measures in place, they leave the city’s infrastructure vulnerable to attack. Unfortunately, in an initial study of three companies who provide these kinds of smart city systems, 17 basic vulnerabilities were present in their products. These vulnerabilities included things like easily guessable passwords, bugs that could allow malware to be introduced, and opportunities for authentication requirements to be side-stepped.

Why This Matters
The harsh reality is that developing smart cities with these kinds of vulnerabilities is the geopolitical equivalent of intentionally wearing a “Kick Me” sign each and every time you went out in public. The United States of America have already learned this the hard way, as electoral systems and the energy grid have been hijacked recently. If appearances aren’t deceiving, actions are being taken to reinforce these vulnerabilities in these IoT devices, but it certainly doesn’t help if careless oversights are being made in the security of major metropolitan areas.

We’re not saying that bringing the Internet of Things to cities is a bad thing, but the security needs to be there. The same goes for businesses. If your business relies on devices that connect to the Internet, like physical security devices, smart appliances, and networking infrastructure, locking down these devices and keeping them patched is critical to keep your operations running without a hitch.

Give Professional Computer Associates a call at 845-876-6561 to learn about the security options we have to offer you.

Hackers Plus Artificial Intelligence Equals Big Tr...
Tip of the Week: Set Your System up with the Apps ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, September 26 2018

Captcha Image


Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Privacy Network Security Hackers Business Computing Hosted Solutions Backup Malware Managed IT Services VoIP Google Email Innovation Disaster Recovery Microsoft Mobile Devices Productivity Software Data Internet Outsourced IT Data Backup Business Continuity Business Smartphones Ransomware communications Efficiency Cybercrime Hardware IT Services Windows 10 IT Support Data Recovery Computer Browser Cloud Computing Android Tech Term Internet of Things Office Saving Money BDR Telephone Systems Computers Server Alert User Tips Workplace Tips Network Windows Business Management Applications Upgrade Cybersecurity Small Business Save Money Virtualization Smartphone Miscellaneous Mobile Device Management Artificial Intelligence Managed IT Collaboration BYOD Quick Tips Social Media Law Enforcement Facebook Chrome Social Engineering Passwords Communication Microsoft Office Firewall Productivity Holiday Private Cloud How To Bandwidth Office 365 Gadgets Money Hacking Mobility Work/Life Balance Router Office Tips Automation Recovery Managed Service Provider Avoiding Downtime App Password Health Gmail Phishing Redundancy Data Protection Business Intelligence VPN Proactive IT Remote Monitoring Data Security Wi-Fi Flexibility Windows 10 Data Management Two-factor Authentication HaaS Budget Training Bring Your Own Device Operating System Managed IT Services Information Technology SaaS Big Data Spam Settings Risk Management Analysis Blockchain Marketing User Error Employer-Employee Relationship Identity Theft Apps Connectivity Entertainment IT Management Encryption Mobile Computing Compliance Word IT Support Black Market Vulnerability Sports Value Google Drive Mobile Device Cleaning Safety Document Management Data Breach File Sharing eWaste Infrastructure Remote Computing Workers Downtime Smart Tech Charger Public Cloud Wireless Technology Managed Service Save Time History Website Content Management Networking Best Practice Electronic Medical Records Shadow IT Unified Threat Management Comparison Streaming Media Automobile Worker Machine Learning Spam Blocking DDoS Virtual Assistant Hiring/Firing Data loss USB Data storage Windows 7 Solid State Drive Government Internet Exlporer HIPAA Computer Care PDF End of Support YouTube Computing Infrastructure Paperless Office Credit Cards Battery OneNote Instant Messaging Samsung Physical Security Legal IT Plan Meetings The Internet of Things Patch Management Business Owner Wearable Technology Update Wireless Education Apple Keyboard Unsupported Software Scam Access Control Information Data Storage CES Content Filtering Servers Root Cause Analysis Travel How to Wireless Internet Experience Loyalty Tip of the week IT solutions Telecommuting Computer Fan Mobile Cables Content Filter Tech Support Augmented Reality Politics Software Tips Strategy Enterprise Content Management Transportation Amazon Web Services Authentication Knowledge Going Green Electronic Health Records Reputation Flash Techology Business Technology Users Files Environment Password Manager Lithium-ion battery Wire Music Robot Windows Server 2008 Hard Drives Remote Work Insurance FENG Relocation Professional Services Video Games Unified Communications Storage Remote Worker webinar Hybrid Cloud Running Cable Chromecast Password Management Benefits Sync Online Shopping Nanotechnology Proactive Network Congestion Laptop Data Warehousing Antivirus Voice over Internet Protocol IaaS Books IBM Customer Virtual Reality Colocation Business Mangement Smart Office Assessment Emails Practices Tools Scalability Theft Wiring Conferencing HBO Specifications Accountants NIST Smart Technology Windows 10s Telephony SharePoint Evernote Uninterrupted Power Supply Remote Monitoring and Maintenance Rootkit Touchpad Multi-Factor Security Human Resources Emergency Distributed Denial of Service Telephone System Worker Commute Employer Employee Relationship Screen Mirroring Software as a Service Recycling Troubleshooting Television Outlook Regulations WiFi Hosted Computing Cortana Addiction GDPR Frequently Asked Questions Millennials Cryptocurrency Skype Wireless Charging Devices Line of Business Content IT Consultant Internet exploMicrosoft Trending Staff Computer Accessories Supercomputer Cast hacker People Criminal Notifications Students Hosted Solution Public Computer Humor Fraud Inventory Safe Mode Two Factor Authentication iPhone Botnet Search Google Apps Cache E-Commerce Excel Fax Server Workforce IoT Audit Start Menu Fiber-Optic Thought Leadership MSP Audiobook Vendor Management Leadership Advertising Lifestyle Digital Signature NarrowBand HVAC Mouse Bluetooth Current Events Mobile Office Google Docs Healthcare Netflix Monitor Amazon Printers Twitter Company Culture Webinar Managing Stress Regulation IT solutions Thank You CrashOverride Administration Congratulations

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!