Contact us today!
561-795-2000 
844-795-2001

FRS Pros Blog

Why Smart Cities May Not Be a Smart Idea Just Yet

Why Smart Cities May Not Be a Smart Idea Just Yet

As of this point, the vast majority of our experience with the Internet of Things has been on a small scale - accessories and appliances that connect to the Internet to gain some added functionality. This technology can also be applied to a larger, more civic purpose - the development of something called a “smart city.” Unfortunately, this application could prove to be as problematic as the IoT we are more accustomed to.

What a Smart City Should Be
On the surface, a smart city sounds like a great idea. Using technology and heavily leaning on Internet of Things principles, a smart city collects data and leverages it to improve public services, inform the local government’s actions, and generally improve the population’s contentedness. Traffic flows more smoothly, infrastructure is better maintained, and life is good.

At least, in theory.

There is an unfortunate tendency for consumer-focused IoT devices to be vulnerable to attack, a trait shared by the systems that control a smart city.

The Effects of an Attack
To fully grasp the influence that an attack on a smart city could have, it would help to take a closer look at some of the systems that a smart city would have in place. As we've established, the motivation behind a smart city is to improve the population’s quality of life, a goal that requires data collection and analysis to be reached.

This data will be collected via sensors that examine a wide variety of factors, like the weather, traffic conditions, and even air quality and radiation. While this data would once be delivered to human decision makers, automated systems would be able to make changes to resolve any issues. For example, if traffic was starting to become congested in a certain area, the surrounding traffic signals could be automatically manipulated to relieve the gridlock.

The trouble starts when these systems don’t have enough security to keep them safe from cyberattack, potentially leaving the city’s infrastructure wide open. In a preliminary study of three companies that could supply the systems that a smart city would be built upon, their products had 17 basic vulnerabilities - and we’re talking very basic vulnerabilities, like easily-guessed passwords, avoidable authentication requirements, and bugs that could let in malware.

Why This is Important
Speaking in a geopolitical sense, enacting a smart city with vulnerabilities like these is like painting a target on one’s back. You only have to look at the fairly recent attacks on both the energy grid and electoral systems of the United States for evidence that infrastructure and civic systems are considered very fair targets. While there are actions in process to shore up these vulnerabilities, opening up metropolitan areas to attack through obvious security flaws would not be a good idea.

Of course, we don’t mean to say that scaling the Internet of Things to a metropolitan scale is inherently not a good idea, either, it’s just there needs to be more security protecting the well-being of the populace that lives there. The same can be said of any business that relies on Internet-connected technology. If the devices and network components that a business uses aren’t patched and secured, that business is vulnerable.

FRS Pros can help. Give us a call at 561-795-2000 to learn about our security solutions and how they can protect your business.

Do You Know How to Determine Your Computing Needs?
Tip of the Week: Evernote as a Productivity Tool
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, September 22 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Network Security Business Management Tech Term Cloud Business Computing Google Software User Tips Hackers Hardware Malware Cybersecurity Microsoft Computer Mobile Devices Windows Efficiency Hosted Solutions Data Backup Browser Productivity Apps Smartphone Innovation Cybercrime Smartphones Operating System Internet of Things Data Recovery Data Security Android Outsourced IT Data Business Continuity Business Money Email Alert Law Enforcement Mobile Device Management Ransomware Vulnerability Backup Office 365 Phishing IT Services Saving Money Managed IT Services VoIP Windows 10 Server IT Support Disaster Recovery Best Practice Collaboration Network Microsoft Office Chrome IT Support Windows 10 Managed Service Provider Computers Managed IT Virtualization Upgrade Blockchain Unsupported Software Information Technology Two-factor Authentication Communications App Cloud Computing Spam Telephone Systems Tech Support Gadgets Employer-Employee Relationship Router Applications Google Drive Information Small Business Data Protection Google Assistant Gmail Holiday Communication Risk Management Data Breach Save Money Artificial Intelligence Government Cost Management Managed IT Services Travel Wi-Fi Augmented Reality Excel Budget Fraud Passwords WannaCry Robot Wireless Technology Update Commerce Shortcut Data Management Politics Miscellaneous The Internet of Things Social Media User Error BDR VPN iPhone Productivity Proactive IT Sports SaaS Users Cortana Networking Facebook Data Storage Managed Service Automation Application Quick Tips Password WiFi Hosted Solution Mobile Device OneNote Google Docs Avoiding Downtime Mobile Security Patch Management Wireless Charging Bring Your Own Device Safety Hacking Audit Devices Solid State Drive Comparison Private Cloud Meetings Licensing Updates Emails Cast Microsoft Excel IT budget Identity Root Cause Analysis Outlook Hybrid Cloud Emergency DDoS Employee-Employer Relationship Point of Sale Computer Fan Credit Cards Going Green App store Social Wireless Internet Files Upgrades Google Maps Spyware Touchpad Hard Disk Drive IT Management Specifications Virus Value Disaster Microsoft Word Recovery Marketing BYOD File Sharing Data Privacy Identity Theft Amazon Humor Business Technology Gamification Apple Administrator IT Solutions Sales Proactive Tablets Maintenance Software as a Service Webinar Storage Social Engineering Lithium-ion battery Hard Drive Workplace Tips Vendor Management Sync Evernote Virtual Assistant Streaming Media Edge Testing FAQ Memory Consultant Bandwidth Access Retail Websites Reputation Computer Forensics Remote Monitoring NFL eWaste IT solutions Identities History Chromebook Samsung Data storage Alexa for Business Chromecast Data Loss Ciminal Telephony Camera Charger Remote Computing Health Financial Touchscreen Internet Exlporer iOS WIndows Server 2008 Conferencing Data Theft Management Legal Word Device Security Encryption Windows 10s HBO Legislation Language Wireless Printing Antivirus Adobe Workers Settings Project Management Mobility Uninterrupted Power Supply Projects Computer Care Nanotechnology Search Screen Mirroring Vendor Gifts Transportation Computing PowerPoint Unified Threat Management Windows Ink Laptop Instant Messaging Hacker Advertising Compliance Printers Scalability Analytics Keyboard Entertainment Regulation HaaS es End of Support Black Market Cleaning Automobile Office Relocation Big Data Managing Stress Twitter Cache Personal Information USB Worker Thank You Scam Training Monitors How To Books Education Hiring/Firing Video Games Experience PDF Mobile Computing Work/Life Balance Television CrashOverride Virtual Reality Congratulations Crowdsourcing Employer Employee Relationship Company Culture Current Events Electronic Medical Records Benefits Phone System Text Messaging Save Time Computer Accessories Battery Smart Technology Flexibility Music Office tips