XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Attempts to Make Smart Cities Hit a Snag

Attempts to Make Smart Cities Hit a Snag

At this point, the concept of the Internet of Things is a fairly familiar one, but that familiarity is to the Internet of Things on the micro scale--appliances with capabilities enhanced by an available connection to the Internet. There is another, more macro application to the Internet of Things: as a way to collect data in a municipal setting. However, like the IoT we are familiar with, these “smart cities” are host to many familiar problems.

The Concept of a Smart City
Like many technological developments, the idea of a smart city is built on good intentions. Through the use of technology (much of it based in the IoT), a smart city leverages collected data to functionally serve the public, embetter the services of government, and improve the quality of life for its citizenry.

That’s the idea, at least.

Unfortunately, like many of the ‘smart’ devices that the populace can interact with, the systems that these cities leverage tend to be susceptible to attack.

What These Attacks Could Do
In order to understand the potential ramifications of these kinds of attacks, it is important to first have an understanding of the kinds of systems that a smart city is built upon.

The true purpose behind creating a smart city is to make it a better place to live, and to do that, certain systems need to be put in place. These systems are powered by the data they collect. With that data, insights into correlated problems can be leveraged to solve them.

The sensors that these cities use to collect this data monitor a wide variety of factors, ranging from traffic conditions to the weather and even health-related factors like air quality and radiation. The data that is collected is then used, through the power of automation, to decide how to approach infrastructural concerns. For instance, if traffic is moving slowly in an area, these systems would deliver that data to decision-makers, allowing them to make the call to reroute traffic a different way to ease the congestion. This system just makes the decisions, too.

The big problem with this is that now, if these systems don’t have sufficient security measures in place, they leave the city’s infrastructure vulnerable to attack. Unfortunately, in an initial study of three companies who provide these kinds of smart city systems, 17 basic vulnerabilities were present in their products. These vulnerabilities included things like easily guessable passwords, bugs that could allow malware to be introduced, and opportunities for authentication requirements to be side-stepped.

Why This Matters
The harsh reality is that developing smart cities with these kinds of vulnerabilities is the geopolitical equivalent of intentionally wearing a “Kick Me” sign each and every time you went out in public. The United States of America have already learned this the hard way, as electoral systems and the energy grid have been hijacked recently. If appearances aren’t deceiving, actions are being taken to reinforce these vulnerabilities in these IoT devices, but it certainly doesn’t help if careless oversights are being made in the security of major metropolitan areas.

We’re not saying that bringing the Internet of Things to cities is a bad thing, but the security needs to be there. The same goes for businesses. If your business relies on devices that connect to the Internet, like physical security devices, smart appliances, and networking infrastructure, locking down these devices and keeping them patched is critical to keep your operations running without a hitch.

Give XFER a call at 734-927-6666 / 800-Get-XFER to learn about the security options we have to offer you.

Hackers Plus Artificial Intelligence Equals Big Tr...
Tip of the Week: Set Your System up with the Apps ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, September 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Saving Money Best Practices Backup Software Workplace Tips Managed Service Provider Business Computing Hackers Small Business Hosted Solutions Data Google Productivity Mobile Office Hardware Mobile Devices VoIP Gadgets Email Quick Tips Malware Efficiency IT Support Network Network Security Social Media Innovation Business Management IT Services Server Smartphones Miscellaneous Business Continuity Virtualization Upgrade Business Windows Communication Disaster Recovery Managed IT Services Microsoft Office Computer Users Communications Mobile Device Management Passwords Data Backup User Tips Android Save Money Smartphone Browser Marketing Holiday Alert WiFi Vendor Management Mobile Computing Ransomware Tech Term Data Recovery Cybercrime Operating System Outsourced IT Remote Monitoring Windows 10 Internet of Things Computers Information Technology BDR Avoiding Downtime Cloud Computing Bring Your Own Device Apple BYOD Artificial Intelligence Going Green Chrome Telephone Systems Automation Current Events VPN History Best Practice Big Data Remote Computing IT Solutions Router The Internet of Things Firewall Application Collaboration Hacking Health Cybersecurity Social Engineering Spam Employer-Employee Relationship Phone System Wireless Technology IT Consultant Trending Facebook Managed IT Services Bandwidth Money Proactive IT Excel Office Lithium-ion Battery App Budget Printer Recovery Business Managament Unified Threat Management Fax Server Networking How To Maintenance iPhone Windows 8 Business Intelligence Applications Content Filtering Two-factor Authentication Mobility Humor Apps Managed IT Outlook Tutorials Virus Value PowerPoint Sports Data Security Private Cloud Website Redundancy Law Enforcement Office 365 Customer Relationship Management Gmail Antivirus Hard Drives Training Mouse Phishing Analytics Windows 10 User Error Data Protection Social Networking Conferencing Vulnerability Blockchain Digital Payment Computer Repair Connectivity Word Save Time Tablet Search Identity Theft Twitter Document Management Office Tips Data Management Streaming Media Risk Management Compliance IT Management Flexibility Encryption Productivity Entertainment Tech Support Saving Time Inbound Marketing Retail Settings Downtime Analysis Google Drive Administration File Sharing Memory Mobile Device IT Support Network Congestion Update Bluetooth eWaste Internet Exlporer Video Surveillance People Data Storage Comparison PDF Samsung Virtual Assistant Work/Life Balance Data Breach USB Windows 7 HaaS End of Support Robot Safety Wi-Fi IBM Government Online Currency Webinar YouTube Piracy Meetings Leadership Recycling Workers Administrator Point of Sale Education Credit Cards DDoS Computer Accessories Statistics Access Control Solid State Drive Data loss Programming Smart Tech Servers Skype Black Market Social Spam Blocking Instant Messaging CES IT Plan Wireless Physical Security Augmented Reality Intranet Scam Environment Cleaning Password Running Cable Machine Learning Wearable Technology Information Human Resources Public Cloud SaaS Biometrics Content Management Touchscreen Unsupported Software Infrastructure IT service Data storage Managed Service Hacker Best Available Paperless Office OneNote Accountants Business Technology User Windows Server 2008 Amazon Web Services IaaS Computing Infrastructure Addiction Worker Commute Touchpad Debate Managing Stress Domains Software Tips Remote Work Relocation Wiring Hosted Solution Bloatware Password Manager Legal Enterprise Content Management Computer Care Monitor Hosted Computing Proactive Keyboard Science Telephony Unified Communications Students Online Shopping Webcam Cache Audit Google Docs Staff Devices GDPR Netflix Entrepreneur Botnet Business Mangement Password Management Data Warehousing Specifications Reputation Inventory Remote Monitoring and Maintenance Tablets Start Menu Theft Healthcare Root Cause Analysis IT Security IoT Telephone System Supercomputer Hiring/Firing Help Desk Regulations Evernote Internet exploMicrosoft Wireless Internet Computer Fan Windows Media Player Virtual Desktop Voice over Internet Protocol Digital Signature PC Care HBO Scheduling Thought Leadership E-Commerce Cost Management Travel Criminal NarrowBand 3D Print Server NIST Millennials Customers Remote Support Line of Business Upgrades Analyitcs Mobile Cortana Uninterrupted Power Supply eBay nternet Crowdfunding Electronic Health Records Alerts Knowledge Wireless Charging Advertising Wire FENG Customer Service Multi-Factor Security Strategy Consultant Frequently Asked Questions Fraud Distributed Denial of Service Files Company Culture Content Filter Patch Management Chromecast Law Firm IT Cryptocurrency Workforce Authentication MSP 360 Emails Professional Services Google Apps Text Messaging Screen Mirroring Work Station Insurance Flash Fiber-Optic Notifications Gaming Console LinkedIn Smart Office Electronic Medical Records Cameras Macro Lifestyle Safe Mode Business Owner Licensing Tip of the week Amazon Colocation Net Neutrality Storage Windows 10s Co-managed IT Software as a Service Laptop Telecommuting SharePoint Windows 8.1 Update Nanotechnology Remote Worker Virtual Reality Tools Shadow IT HVAC Charger Cast WIndows 7 Display Practices HIPAA Sync Cables Hybrid Cloud Hiring/Firing Printer Server Shortcut Automobile Public Computer Benefits IT solutions Employer Employee Relationship CrashOverride Smart Technology Books Loyalty Experience Content Two Factor Authentication Battery Thank You Emergency Video Games Music Worker Regulation Audiobook Assessment Congratulations Camera Scalability Rootkit Politics Television Printers Transportation How to Troubleshooting Webinar Techology

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *