Contact us today!

Network Solutions Unlimited Blog

Why Smart Cities May Not Be a Smart Idea Just Yet

Why Smart Cities May Not Be a Smart Idea Just Yet

As of this point, the vast majority of our experience with the Internet of Things has been on a small scale - accessories and appliances that connect to the Internet to gain some added functionality. This technology can also be applied to a larger, more civic purpose - the development of something called a “smart city.” Unfortunately, this application could prove to be as problematic as the IoT we are more accustomed to.

What a Smart City Should Be
On the surface, a smart city sounds like a great idea. Using technology and heavily leaning on Internet of Things principles, a smart city collects data and leverages it to improve public services, inform the local government’s actions, and generally improve the population’s contentedness. Traffic flows more smoothly, infrastructure is better maintained, and life is good.

At least, in theory.

There is an unfortunate tendency for consumer-focused IoT devices to be vulnerable to attack, a trait shared by the systems that control a smart city.

The Effects of an Attack
To fully grasp the influence that an attack on a smart city could have, it would help to take a closer look at some of the systems that a smart city would have in place. As we've established, the motivation behind a smart city is to improve the population’s quality of life, a goal that requires data collection and analysis to be reached.

This data will be collected via sensors that examine a wide variety of factors, like the weather, traffic conditions, and even air quality and radiation. While this data would once be delivered to human decision makers, automated systems would be able to make changes to resolve any issues. For example, if traffic was starting to become congested in a certain area, the surrounding traffic signals could be automatically manipulated to relieve the gridlock.

The trouble starts when these systems don’t have enough security to keep them safe from cyberattack, potentially leaving the city’s infrastructure wide open. In a preliminary study of three companies that could supply the systems that a smart city would be built upon, their products had 17 basic vulnerabilities - and we’re talking very basic vulnerabilities, like easily-guessed passwords, avoidable authentication requirements, and bugs that could let in malware.

Why This is Important
Speaking in a geopolitical sense, enacting a smart city with vulnerabilities like these is like painting a target on one’s back. You only have to look at the fairly recent attacks on both the energy grid and electoral systems of the United States for evidence that infrastructure and civic systems are considered very fair targets. While there are actions in process to shore up these vulnerabilities, opening up metropolitan areas to attack through obvious security flaws would not be a good idea.

Of course, we don’t mean to say that scaling the Internet of Things to a metropolitan scale is inherently not a good idea, either, it’s just there needs to be more security protecting the well-being of the populace that lives there. The same can be said of any business that relies on Internet-connected technology. If the devices and network components that a business uses aren’t patched and secured, that business is vulnerable.

Network Solutions Unlimited can help. Give us a call at 217-428-6449 to learn about our security solutions and how they can protect your business.

Do You Know How to Determine Your Computing Needs?
Tip of the Week: Evernote as a Productivity Tool


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, February 18 2019

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Employer Employee Relationship Money End of Support Hacking Television BDR Business Management Phone System Shortcut Internet of Things Malware Gamification Search Experience Public Cloud Technology Business Intelligence Google Drive Hybrid Cloud Worker Users Virtual Assistant OneNote Chrome Physical Security Mobile Device Management Fraud VoIP Mobility Windows App store Maintenance Regulation Bring Your Own Device Office Students Data Loss Saving Time Advertising CrashOverride Artificial Intelligence Microsoft Managed IT Service Connectivity Applications Shadow IT Files NFL Utility Computing Smartphones Virtual Private Network Amazon Spyware Wasting Money Browser Gmail Techology Passwords Holiday Managed IT Services Managed Service Avoiding Downtime PDF Google Docs Office 365 IT budget Recovery Wi-Fi Alexa for Business Retail Risk Management Chromebook Vendor Testing Management Credit Cards Audiobook Computers Samsung Mobile Security Legal Device Security WPA3 Big Data Keyboard Shortcuts How To User Tips Upgrades Twitter Router Facebook Project Management Computer Fan Quick Tips Sync Hard Drives Budget Identity Software as a Service Best Practice Hosted Solution Proactive Administration Wireless Technology File Storage Microsoft Word Webinar Troubleshooting Outlook Projects Gifts Monitor Information Antivirus Reputation Microsoft Excel Dark Web Solid State Drive Saving Money Unsupported Software PowerPoint Collaboration Proactive IT Bandwidth Social Engineering IT solutions Cost Management Emails Audit Loyalty Commerce Payment Cards Public Computer Data Storage Information Technology Specifications History Touchpad Rootkit Firewall Going Green Unified Threat Management Mobile Device Save Money Cybersecurity WiFi Network Workplace Tips Automobile Video Games intranet Outsourced IT Scam File Sharing Assessment Microsoft Office Language Tip of the Week Phishing Safety Telephone Systems Admin Computer Forensics Black Market Virtualization Mobile Internet Smartphone Spam Smart Tech Identities Screen Mirroring HIPAA Hackers Data Breach BYOD Accessory Wasting Time Business Technology Computing Robot Adobe Windows 10s Computer Care Entertainment Printing WannaCry Printers IT Service Remote Computing Internet Exlporer Security Cameras Alert Access Control IT Management Networking Social Media Automation Software Spam Blocking Two-factor Authentication Managing Stress Google Assistant Gadgets Co-Managed Services Value Virtual Reality Computer Accessories Ciminal Managed IT Augmented Reality Operating System Data Security HBO Windows Ink Flexibility hacker Conferencing Paperless Office Efficiency Data Theft IoT Remote Workers USB Managed Service Provider Data storage Ransomware Upgrade Updates Hard Disk Drive Miscellaneous IT Solutions Battery Data Management Employer-Employee Relationship User Error Computer Humor Peripheral Politics Hardware SaaS Instant Messaging Chromecast Employee-Employer Relationship Wireless Internet Smart Technology Compliance Android WIndows Server 2008 Relocation Update Tech Support Settings Analysis Data Backup Communication Vulnerability Content Mobile Devices Lifestyle Windows 10 Encryption Data Identity Theft Patch Management Human Resources Workers Memory Backup and Disaster Recovery Office Tips IT Services Books SMB Content Filter Security Education Data Protection Cortana Cast Touchscreen Content Filtering Productivity Application The Internet of Things Telephone Apps Streaming Media Monitoring Travel Root Cause Analysis Vendor Management Laptop Virus Wireless Charging Tablets E-Commerce Hiring/Firing Privacy Camera Tech Term Sales Financial Technology Server Devices Colocation Password Congratulations Business Continuity Edge App Data Recovery Business Owner Work/Life Balance Managed IT Services Marketing Google eWaste Backup Business Customer Licensing Business Computing Monitors Windows 10 Electronic Medical Records Benefits Bluetooth Excel Downtime Cache How to Small Business Wireless Sports Internet exploMicrosoft Meetings Legislation Cleaning Scalability Disaster Recovery Apple MSP Evernote Storage VPN Government Worker Commute HaaS Hard Drive Cybercrime Private Cloud Cloud Computing Hosted Solutions Company Culture Display Machine Learning Websites iPhone Employee Training Remote Monitoring Charger Financial Nanotechnology Windows 7 IT Support Thank You Redundancy Innovation Best Practices FAQ iOS Computing Infrastructure Law Enforcement Professional Services Consultant Data Privacy Keyboard IT Support Email Save Time Document Management Two Factor Authentication Hyperlink Word Health Cloud Payroll Productivity Network Security Personal Information Google Maps Transportation Blockchain Comparison Unified Communications Communications Emergency