XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Attempts to Make Smart Cities Hit a Snag

Attempts to Make Smart Cities Hit a Snag

At this point, the concept of the Internet of Things is a fairly familiar one, but that familiarity is to the Internet of Things on the micro scale--appliances with capabilities enhanced by an available connection to the Internet. There is another, more macro application to the Internet of Things: as a way to collect data in a municipal setting. However, like the IoT we are familiar with, these “smart cities” are host to many familiar problems.

The Concept of a Smart City
Like many technological developments, the idea of a smart city is built on good intentions. Through the use of technology (much of it based in the IoT), a smart city leverages collected data to functionally serve the public, embetter the services of government, and improve the quality of life for its citizenry.

That’s the idea, at least.

Unfortunately, like many of the ‘smart’ devices that the populace can interact with, the systems that these cities leverage tend to be susceptible to attack.

What These Attacks Could Do
In order to understand the potential ramifications of these kinds of attacks, it is important to first have an understanding of the kinds of systems that a smart city is built upon.

The true purpose behind creating a smart city is to make it a better place to live, and to do that, certain systems need to be put in place. These systems are powered by the data they collect. With that data, insights into correlated problems can be leveraged to solve them.

The sensors that these cities use to collect this data monitor a wide variety of factors, ranging from traffic conditions to the weather and even health-related factors like air quality and radiation. The data that is collected is then used, through the power of automation, to decide how to approach infrastructural concerns. For instance, if traffic is moving slowly in an area, these systems would deliver that data to decision-makers, allowing them to make the call to reroute traffic a different way to ease the congestion. This system just makes the decisions, too.

The big problem with this is that now, if these systems don’t have sufficient security measures in place, they leave the city’s infrastructure vulnerable to attack. Unfortunately, in an initial study of three companies who provide these kinds of smart city systems, 17 basic vulnerabilities were present in their products. These vulnerabilities included things like easily guessable passwords, bugs that could allow malware to be introduced, and opportunities for authentication requirements to be side-stepped.

Why This Matters
The harsh reality is that developing smart cities with these kinds of vulnerabilities is the geopolitical equivalent of intentionally wearing a “Kick Me” sign each and every time you went out in public. The United States of America have already learned this the hard way, as electoral systems and the energy grid have been hijacked recently. If appearances aren’t deceiving, actions are being taken to reinforce these vulnerabilities in these IoT devices, but it certainly doesn’t help if careless oversights are being made in the security of major metropolitan areas.

We’re not saying that bringing the Internet of Things to cities is a bad thing, but the security needs to be there. The same goes for businesses. If your business relies on devices that connect to the Internet, like physical security devices, smart appliances, and networking infrastructure, locking down these devices and keeping them patched is critical to keep your operations running without a hitch.

Give XFER a call at 734-927-6666 / 800-Get-XFER to learn about the security options we have to offer you.

Hackers Plus Artificial Intelligence Equals Big Tr...
Tip of the Week: Set Your System up with the Apps ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, December 14 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Software Managed Service Provider Business Computing Hosted Solutions Hackers Data Small Business Hardware Google Mobile Devices Productivity Mobile Office VoIP Gadgets Email Malware Quick Tips Network Security Efficiency Network IT Support Innovation Business Social Media Business Management Business Continuity IT Services Miscellaneous Server Smartphones Upgrade Virtualization Communication Windows User Tips Disaster Recovery Data Backup Communications Computer Microsoft Office Managed IT Services Users Browser Data Recovery Mobile Device Management Passwords Android Smartphone WiFi Holiday Save Money Marketing Ransomware Outsourced IT Alert Mobile Computing BDR Vendor Management Cybercrime Tech Term Windows 10 Internet of Things Cloud Computing Chrome Operating System Remote Monitoring Bring Your Own Device Apple BYOD Computers Information Technology Avoiding Downtime IT Solutions Cybersecurity The Internet of Things Artificial Intelligence Router Firewall Going Green Spam Telephone Systems Automation Current Events Big Data VPN Managed IT Services Remote Computing History Best Practice Phone System Trending Wireless Technology Printer IT Consultant Facebook Application Collaboration Hacking Health Social Engineering Employer-Employee Relationship Office Excel Lithium-ion Battery App Budget Money Proactive IT Bandwidth Mouse Two-factor Authentication Content Filtering How To Mobility Productivity Recovery Windows 10 Business Managament Unified Threat Management IT Support Business Intelligence Fax Server Networking Maintenance Office 365 Windows 8 Applications iPhone Hard Drives Data Security Training Google Drive User Error Sports Managed IT Value Mobile Device Humor Information Apps Phishing Outlook Tutorials Virus PowerPoint Private Cloud Website Data Protection Antivirus Redundancy Blockchain Word Law Enforcement Gmail Encryption Customer Relationship Management Analytics Downtime Identity Theft Tech Support Retail Inbound Marketing Settings File Sharing Memory Scam Voice over Internet Protocol Human Resources Conferencing IT Management Network Congestion Administration Servers Search Tablet Twitter Digital Payment Social Networking Analysis Document Management Computer Repair Streaming Media Risk Management Software as a Service Save Time Managed Service Office Tips Data Management Administrator Connectivity Vulnerability Compliance Saving Time Flexibility Entertainment Instant Messaging Environment Telephone System Workers Cleaning Password Wireless Physical Security Social Public Cloud Best Available SaaS Bluetooth Credit Cards Access Control Biometrics Smart Tech Touchscreen IT service Data loss People Hacker Data storage Samsung Fraud Spam Blocking CES Machine Learning IT Plan Internet Exlporer Online Currency eWaste PDF Recycling Video Surveillance Point of Sale HaaS End of Support Education Robot Safety Wi-Fi Content Management USB Statistics Unsupported Software YouTube Infrastructure Paperless Office Government Piracy Webinar OneNote Meetings IBM Programming Skype Leadership Update Help Desk Data Storage DDoS Virtual Assistant Keyboard Solid State Drive Augmented Reality Intranet Computer Accessories Telephony Running Cable Comparison Work/Life Balance Data Breach Wearable Technology Windows 7 Black Market Google Docs Distributed Denial of Service Files Inventory Remote Monitoring and Maintenance Netflix Chromecast Net Neutrality Alerts Botnet Business Mangement Consultant Healthcare Shortcuts IoT Windows 8.1 Update Start Menu Theft Wireless Internet Warranty Root Cause Analysis Data Warehousing Specifications NIST Supercomputer Notifications Display Text Messaging Regulations Evernote Cameras Thought Leadership E-Commerce Computer Fan Digital Signature Colocation Gaming Console Debate HBO Line of Business Laptop Work Station Travel Criminal Macro Licensing Electronic Health Records Virtual Reality Shadow IT Mobile Cortana Co-managed IT WIndows 7 Wire Microchip SharePoint Millennials Cryptocurrency Knowledge Hybrid Cloud Wireless Charging Printer Server Content Filter Shortcut Camera FENG Multi-Factor Security Strategy IaaS Computing Infrastructure Frequently Asked Questions Worker Commute Authentication MSP Patch Management Touchpad User Workforce Insurance Bloatware 360 Emails Legal Professional Services Google Apps Managing Stress Smart Office Domains Screen Mirroring Relocation Science Safe Mode Flash Fiber-Optic Storage Electronic Medical Records Monitor Lifestyle IT Security Tip of the week Amazon Nanotechnology Remote Worker Windows 10s HVAC Business Owner Telecommuting Practices Entrepreneur Tools Search Engine Charger Cast Print Server Webcam Accountants Tablets Business Technology HIPAA Remote Support Sync Cables Addiction Virtual Private Network Hiring/Firing Reputation nternet Crowdfunding Internet exploMicrosoft Windows Server 2008 Amazon Web Services Windows Media Player Virtual Desktop Wiring Hiring/Firing Enterprise Content Management Law Firm IT Software Tips Remote Work Hosted Computing Cost Management Proactive Hosted Solution NarrowBand Company Culture PC Care Password Manager Students Bing Computer Care Upgrades Analyitcs Uninterrupted Power Supply 3D Unified Communications Cache Project Management Customers Scheduling Advertising eBay Online Shopping Devices Customer Service GDPR Audit LinkedIn Staff Password Management Books Scalability Loyalty Congratulations Experience Content Two Factor Authentication Emergency How to eCommerce Regulation Music Techology Worker Audiobook Assessment Utility Computing Rootkit Politics Printers Transportation Television Troubleshooting Webinar Automobile Public Computer Benefits Battery IT solutions Video Games Thank You Employer Employee Relationship CrashOverride Smart Technology

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *