Contact us today!
217-428-6449

Network Solutions Unlimited Blog

Why Smart Cities May Not Be a Smart Idea Just Yet

Why Smart Cities May Not Be a Smart Idea Just Yet

As of this point, the vast majority of our experience with the Internet of Things has been on a small scale - accessories and appliances that connect to the Internet to gain some added functionality. This technology can also be applied to a larger, more civic purpose - the development of something called a “smart city.” Unfortunately, this application could prove to be as problematic as the IoT we are more accustomed to.

What a Smart City Should Be
On the surface, a smart city sounds like a great idea. Using technology and heavily leaning on Internet of Things principles, a smart city collects data and leverages it to improve public services, inform the local government’s actions, and generally improve the population’s contentedness. Traffic flows more smoothly, infrastructure is better maintained, and life is good.

At least, in theory.

There is an unfortunate tendency for consumer-focused IoT devices to be vulnerable to attack, a trait shared by the systems that control a smart city.

The Effects of an Attack
To fully grasp the influence that an attack on a smart city could have, it would help to take a closer look at some of the systems that a smart city would have in place. As we've established, the motivation behind a smart city is to improve the population’s quality of life, a goal that requires data collection and analysis to be reached.

This data will be collected via sensors that examine a wide variety of factors, like the weather, traffic conditions, and even air quality and radiation. While this data would once be delivered to human decision makers, automated systems would be able to make changes to resolve any issues. For example, if traffic was starting to become congested in a certain area, the surrounding traffic signals could be automatically manipulated to relieve the gridlock.

The trouble starts when these systems don’t have enough security to keep them safe from cyberattack, potentially leaving the city’s infrastructure wide open. In a preliminary study of three companies that could supply the systems that a smart city would be built upon, their products had 17 basic vulnerabilities - and we’re talking very basic vulnerabilities, like easily-guessed passwords, avoidable authentication requirements, and bugs that could let in malware.

Why This is Important
Speaking in a geopolitical sense, enacting a smart city with vulnerabilities like these is like painting a target on one’s back. You only have to look at the fairly recent attacks on both the energy grid and electoral systems of the United States for evidence that infrastructure and civic systems are considered very fair targets. While there are actions in process to shore up these vulnerabilities, opening up metropolitan areas to attack through obvious security flaws would not be a good idea.

Of course, we don’t mean to say that scaling the Internet of Things to a metropolitan scale is inherently not a good idea, either, it’s just there needs to be more security protecting the well-being of the populace that lives there. The same can be said of any business that relies on Internet-connected technology. If the devices and network components that a business uses aren’t patched and secured, that business is vulnerable.

Network Solutions Unlimited can help. Give us a call at 217-428-6449 to learn about our security solutions and how they can protect your business.

Do You Know How to Determine Your Computing Needs?
Tip of the Week: Evernote as a Productivity Tool
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, November 21 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Travel Artificial Intelligence Projects Accessory Tech Term Google Assistant Computer Care Screen Mirroring Colocation Scalability Entertainment Computer Apps Emails Physical Security Gifts Video Games Office Hiring/Firing Miscellaneous Two Factor Authentication Ransomware Windows IoT Recovery Software as a Service Credit Cards Loyalty Peripheral Regulation Data Security Best Practices Hard Drives Security Privacy Data Breach Mobile Administration Connectivity Tip of the Week Monitoring SaaS BDR Laptop Specifications Search Remote Monitoring Business Intelligence Humor Software Money Microsoft Word Display Content Filter Management Employer-Employee Relationship Internet of Things HIPAA Innovation Microsoft Excel Smart Technology Computing Infrastructure Keyboard Shortcuts Productivity Thank You Commerce Camera Wireless Technology Network Telephone Financial Device Security Avoiding Downtime Business Continuity Comparison Update Managed IT Service Students Cleaning Wasting Money Windows 10 Data Privacy USB Passwords Hacking Hosted Solutions Chromecast Unsupported Software Websites Customer Users Backup Hard Drive Project Management Gmail Congratulations Bring Your Own Device Virtualization VPN Cloud Root Cause Analysis Application Meetings Social Media Consultant Sync Office Tips Gamification Business Technology Windows 10 History Holiday Internet exploMicrosoft Computers Sales Gadgets hacker Assessment Automobile Adobe Phone System Applications Remote Computing Rootkit Cost Management Employee-Employer Relationship Two-factor Authentication Windows Ink Advertising Word Twitter Internet Worker Commute Solid State Drive VoIP Professional Services Files Google Drive The Internet of Things Government Content Books Operating System CrashOverride Testing Edge Chromebook How to Cloud Computing File Storage Storage Bluetooth Computing Vulnerability Bandwidth Tech Support Private Cloud Virus Small Business Spam Blocking Co-Managed Services Settings Cortana iPhone Blockchain Router Antivirus Firewall Ciminal Worker Dark Web Relocation Electronic Medical Records Wi-Fi MSP Mobile Devices Google Maps Scam Vendor Management Budget Managed IT Services Phishing Business Big Data Devices Android Cybercrime Computer Accessories Wireless Internet Downtime Efficiency Smart Tech Smartphone Access Control Monitors Mobile Security Malware Apple Outsourced IT Saving Money Tablets Audiobook iOS Amazon IT budget Workplace Tips Webinar Identity Theft Health Disaster Recovery WiFi Techology Touchscreen Content Filtering Hybrid Cloud Troubleshooting Data storage Monitor Wireless Safety Mobility IT Services Quick Tips Communication Spyware Audit Experience IT Solutions Robot Law Enforcement Battery Wireless Charging eWaste WPA3 Upgrades Hardware Email Hard Disk Drive Analysis Facebook BYOD Nanotechnology Proactive IT Personal Information Emergency Save Time Financial Technology Evernote Sports Retail Network Security How To Automation App store Microsoft Office Google Saving Time Public Computer Touchpad Microsoft Wasting Time PowerPoint Instant Messaging Value Benefits Windows 10s Training Vendor Managed IT Services Shortcut Smartphones Black Market HBO Alert Going Green IT Management User Error Mobile Device Data Protection Admin intranet Utility Computing File Sharing Education FAQ Technology Google Docs Licensing Cast Information Technology Alexa for Business Samsung Company Culture Data Storage Compliance Data Loss Legal Managed Service Provider Encryption Legislation Lifestyle Flexibility Memory Printing Hackers Social Engineering PDF Hosted Solution Printers Streaming Media Office 365 Cybersecurity Augmented Reality WannaCry Updates Employer Employee Relationship Mobile Device Management Managing Stress Marketing Information Risk Management Charger Language Reputation Hyperlink Identity Managed IT Browser Chrome Business Owner End of Support App HaaS Workers Managed Service NFL Upgrade Politics Fraud Business Computing Work/Life Balance IT solutions Telephone Systems IT Support Redundancy Collaboration OneNote Password Productivity Best Practice Unified Threat Management Outlook Computer Fan Document Management Shadow IT Virtual Assistant Maintenance Patch Management Computer Forensics Business Management Data Backup Television Conferencing Data Recovery Save Money User Tips Excel Data Data Theft Keyboard Windows 7 Data Management Unified Communications Server WIndows Server 2008 Identities Transportation Spam Networking Virtual Reality Proactive Public Cloud Cache Communications Internet Exlporer IT Support