XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Attempts to Make Smart Cities Hit a Snag

Attempts to Make Smart Cities Hit a Snag

At this point, the concept of the Internet of Things is a fairly familiar one, but that familiarity is to the Internet of Things on the micro scale--appliances with capabilities enhanced by an available connection to the Internet. There is another, more macro application to the Internet of Things: as a way to collect data in a municipal setting. However, like the IoT we are familiar with, these “smart cities” are host to many familiar problems.

The Concept of a Smart City
Like many technological developments, the idea of a smart city is built on good intentions. Through the use of technology (much of it based in the IoT), a smart city leverages collected data to functionally serve the public, embetter the services of government, and improve the quality of life for its citizenry.

That’s the idea, at least.

Unfortunately, like many of the ‘smart’ devices that the populace can interact with, the systems that these cities leverage tend to be susceptible to attack.

What These Attacks Could Do
In order to understand the potential ramifications of these kinds of attacks, it is important to first have an understanding of the kinds of systems that a smart city is built upon.

The true purpose behind creating a smart city is to make it a better place to live, and to do that, certain systems need to be put in place. These systems are powered by the data they collect. With that data, insights into correlated problems can be leveraged to solve them.

The sensors that these cities use to collect this data monitor a wide variety of factors, ranging from traffic conditions to the weather and even health-related factors like air quality and radiation. The data that is collected is then used, through the power of automation, to decide how to approach infrastructural concerns. For instance, if traffic is moving slowly in an area, these systems would deliver that data to decision-makers, allowing them to make the call to reroute traffic a different way to ease the congestion. This system just makes the decisions, too.

The big problem with this is that now, if these systems don’t have sufficient security measures in place, they leave the city’s infrastructure vulnerable to attack. Unfortunately, in an initial study of three companies who provide these kinds of smart city systems, 17 basic vulnerabilities were present in their products. These vulnerabilities included things like easily guessable passwords, bugs that could allow malware to be introduced, and opportunities for authentication requirements to be side-stepped.

Why This Matters
The harsh reality is that developing smart cities with these kinds of vulnerabilities is the geopolitical equivalent of intentionally wearing a “Kick Me” sign each and every time you went out in public. The United States of America have already learned this the hard way, as electoral systems and the energy grid have been hijacked recently. If appearances aren’t deceiving, actions are being taken to reinforce these vulnerabilities in these IoT devices, but it certainly doesn’t help if careless oversights are being made in the security of major metropolitan areas.

We’re not saying that bringing the Internet of Things to cities is a bad thing, but the security needs to be there. The same goes for businesses. If your business relies on devices that connect to the Internet, like physical security devices, smart appliances, and networking infrastructure, locking down these devices and keeping them patched is critical to keep your operations running without a hitch.

Give XFER a call at 734-927-6666 / 800-438-9337 to learn about the security options we have to offer you.

Hackers Plus Artificial Intelligence Equals Big Tr...
Tip of the Week: Set Your System up with the Apps ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, February 22 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Business Computing Software Managed Service Provider Hosted Solutions Hackers Data Small Business Google Mobile Devices Hardware Productivity VoIP Mobile Office Network Security Gadgets Malware Email Quick Tips Efficiency Network Innovation IT Support IT Services Business Management Social Media Business Smartphones Business Continuity Server Miscellaneous Upgrade User Tips Communication Virtualization Communications Disaster Recovery Windows Data Backup Computer Microsoft Office Managed IT Services Data Recovery Users Smartphone Browser Mobile Device Management Passwords Android Holiday WiFi Internet of Things Marketing Save Money Alert Ransomware Tech Term Outsourced IT Cybercrime BDR Vendor Management Artificial Intelligence Cloud Computing Mobile Computing Router Chrome Operating System Remote Monitoring Productivity Windows 10 Bring Your Own Device Apple BYOD Computers Information Technology Automation Avoiding Downtime Cybersecurity History Spam Best Practice Going Green Big Data Collaboration Remote Computing Managed IT Services IT Solutions Firewall The Internet of Things Telephone Systems VPN Health Current Events Proactive IT IT Consultant Application Hacking Printer Trending Facebook Social Engineering Employer-Employee Relationship Phone System Wireless Technology Mobility Budget Windows 10 Mobile Device Excel IT Support App Bandwidth Office Lithium-ion Battery Money Maintenance Content Filtering Windows 8 Phishing Business Intelligence Recovery Unified Threat Management Networking Private Cloud Business Managament iPhone How To Training Mouse Fax Server Office 365 Encryption Two-factor Authentication Applications Information Antivirus Google Drive Apps Save Time Analytics Managed IT User Error PowerPoint File Sharing Website Data Protection Humor Blockchain Outlook Word Tutorials Gmail Redundancy Customer Relationship Management Virus Law Enforcement Value Hard Drives Sports Data Security Settings Access Control Voice over Internet Protocol Streaming Media Risk Management Machine Learning Administration Network Congestion Hacker IT Management Tech Support Servers Analysis Saving Time Scam Digital Payment Social Networking Computer Repair Vulnerability Managed Service Software as a Service Downtime Connectivity Memory Office Tips Wi-Fi Administrator Conferencing Compliance Flexibility Data Management Entertainment Tablet Search Twitter Inbound Marketing Retail Identity Theft Social Document Management Human Resources Smart Tech Biometrics Education Touchscreen Cleaning Password Credit Cards Statistics IT service Wireless Physical Security Public Cloud SaaS Skype Programming CES Fraud OneNote Augmented Reality Intranet Video Surveillance IT Plan Running Cable Data storage USB Robot Paperless Office Wearable Technology Data Storage eWaste Content Management Business Technology Net Neutrality Keyboard Internet Exlporer Infrastructure Piracy Work/Life Balance Data Breach PDF Unsupported Software IBM HaaS End of Support Leadership Best Available Safety Display Government Update Virtual Assistant Workers YouTube Bluetooth Computer Accessories People Meetings Comparison Samsung Telephony Healthcare DDoS Google Docs Webinar Telephone System Instant Messaging Windows 7 Data loss Botnet Online Currency Environment Solid State Drive Help Desk Point of Sale Spam Blocking Black Market Recycling Distributed Denial of Service Files Digital Signature Work Station 360 Emails Chromecast Regulations Evernote Gaming Console Wire IT Security Microchip Screen Mirroring Licensing Travel Criminal Cryptocurrency Virtual Reality Restore Data HBO Content Filter Print Server Camera Electronic Medical Records WIndows 7 Remote Support Business Owner Vendor Digital Signage Notifications Millennials Authentication nternet MSP Crowdfunding Windows 10s Printer Server Shortcut Mobile Cortana User Colocation Multi-Factor Security Strategy Insurance Worker Commute Laptop Wireless Charging Smart Office Charger Cast Safe Mode Company Culture HIPAA Bloatware Backup and Disaster Recovery Shadow IT Frequently Asked Questions Storage Law Firm IT Hiring/Firing Managing Stress Domains SharePoint HVAC Security Cameras Science Google Search Hybrid Cloud Workforce Nanotechnology Macro Remote Worker Professional Services Google Apps IaaS Computing Infrastructure Lifestyle Practices Co-managed IT LinkedIn Hosted Solution Touchpad Flash Fiber-Optic Search Engine Computer Care Relocation Accountants Entrepreneur Legal Tip of the week Amazon Webcam Addiction Virtual Private Network Enterprise Content Management Windows 8.1 Update Employee/Employer Relationship Tablets ISP Telecommuting Wiring Audit Monitor Tools Hiring/Firing Hosted Computing Proactive Netflix Windows Media Player Virtual Desktop Sync Cables Students Bing PC Care Cost Management Windows Server 2008 Amazon Web Services Cache Project Management Debate Root Cause Analysis Password Manager 3D Password Management Supercomputer Upgrades Analyitcs File Versioning Software Tips Remote Work Scheduling Devices GDPR Computer Fan Reputation Shortcuts Smartwatch Internet exploMicrosoft Inventory Remote Monitoring and Maintenance Customer Service Unified Communications eBay Staff IoT Alerts NarrowBand Online Shopping Wireless Internet Warranty Consultant Business Mangement NIST Knowledge Multiple Versions Uninterrupted Power Supply Thought Leadership E-Commerce FENG Customers Electronic Health Records Text Messaging eCommerce Employee Advertising Data Warehousing Specifications Line of Business Patch Management Cameras Start Menu Theft Regulation Scalability Thank You Rootkit Politics Television Transportation Troubleshooting Webinar How to Congratulations Utility Computing Techology Printers Automobile Public Computer Benefits IT solutions Cryptomining Employer Employee Relationship CrashOverride Smart Technology Books Loyalty Experience Content Two Factor Authentication Emergency Battery Music Video Games Worker Audiobook Assessment

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *