Contact us today!

FRS Pros Blog

Why Smart Cities May Not Be a Smart Idea Just Yet

Why Smart Cities May Not Be a Smart Idea Just Yet

As of this point, the vast majority of our experience with the Internet of Things has been on a small scale - accessories and appliances that connect to the Internet to gain some added functionality. This technology can also be applied to a larger, more civic purpose - the development of something called a “smart city.” Unfortunately, this application could prove to be as problematic as the IoT we are more accustomed to.

What a Smart City Should Be
On the surface, a smart city sounds like a great idea. Using technology and heavily leaning on Internet of Things principles, a smart city collects data and leverages it to improve public services, inform the local government’s actions, and generally improve the population’s contentedness. Traffic flows more smoothly, infrastructure is better maintained, and life is good.

At least, in theory.

There is an unfortunate tendency for consumer-focused IoT devices to be vulnerable to attack, a trait shared by the systems that control a smart city.

The Effects of an Attack
To fully grasp the influence that an attack on a smart city could have, it would help to take a closer look at some of the systems that a smart city would have in place. As we've established, the motivation behind a smart city is to improve the population’s quality of life, a goal that requires data collection and analysis to be reached.

This data will be collected via sensors that examine a wide variety of factors, like the weather, traffic conditions, and even air quality and radiation. While this data would once be delivered to human decision makers, automated systems would be able to make changes to resolve any issues. For example, if traffic was starting to become congested in a certain area, the surrounding traffic signals could be automatically manipulated to relieve the gridlock.

The trouble starts when these systems don’t have enough security to keep them safe from cyberattack, potentially leaving the city’s infrastructure wide open. In a preliminary study of three companies that could supply the systems that a smart city would be built upon, their products had 17 basic vulnerabilities - and we’re talking very basic vulnerabilities, like easily-guessed passwords, avoidable authentication requirements, and bugs that could let in malware.

Why This is Important
Speaking in a geopolitical sense, enacting a smart city with vulnerabilities like these is like painting a target on one’s back. You only have to look at the fairly recent attacks on both the energy grid and electoral systems of the United States for evidence that infrastructure and civic systems are considered very fair targets. While there are actions in process to shore up these vulnerabilities, opening up metropolitan areas to attack through obvious security flaws would not be a good idea.

Of course, we don’t mean to say that scaling the Internet of Things to a metropolitan scale is inherently not a good idea, either, it’s just there needs to be more security protecting the well-being of the populace that lives there. The same can be said of any business that relies on Internet-connected technology. If the devices and network components that a business uses aren’t patched and secured, that business is vulnerable.

FRS Pros can help. Give us a call at 561-795-2000 to learn about our security solutions and how they can protect your business.

Do You Know How to Determine Your Computing Needs?
Tip of the Week: Evernote as a Productivity Tool


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, November 15 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Network Security Business Management Google Cloud Tech Term Business Computing Software User Tips Hackers Hardware Malware Microsoft Computer Browser Productivity Efficiency Windows Cybersecurity Mobile Devices Data Backup Hosted Solutions Cybercrime Innovation Apps Internet of Things Smartphone Backup IT Services Windows 10 Smartphones Data Recovery Office 365 Data Security Operating System Email Outsourced IT Android Data Business Money Business Continuity Mobile Device Management Alert Upgrade Vulnerability Law Enforcement Disaster Recovery Ransomware VoIP Phishing IT Support Chrome Communications Managed IT Services Saving Money Microsoft Office Collaboration Network Server Employer-Employee Relationship Applications Best Practice IT Support Managed IT Unsupported Software Small Business App Windows 10 Cloud Computing Spam Computers Information Technology Passwords Virtualization Miscellaneous Telephone Systems Router Blockchain Tech Support Information Gadgets Two-factor Authentication Google Drive Managed Service Provider Workplace Tips Avoiding Downtime Google Assistant Automation Evernote Password Cost Management Managed IT Services User Error BDR Augmented Reality Communication Commerce Cortana Hacking Users WannaCry Networking Artificial Intelligence Gmail Word Save Money Government Application Encryption SaaS Google Docs Project Management Safety Robot Patch Management Proactive IT Wireless Charging Devices Budget Wireless Technology Holiday Touchscreen Data Storage The Internet of Things Social Media Risk Management WiFi VPN iPhone Data Breach Data Management Mobile Device OneNote Productivity Facebook Managed Service Travel Wi-Fi Audit Excel Sports Mobile Security Fraud Update Quick Tips Bring Your Own Device Data Protection Politics Hosted Solution Shortcut Vendor Management Mobility Upgrades Hyperlink Storage Social Engineering Internet Exlporer Search Computer Fan Sync Laptop Identity Edge Transportation Hybrid Cloud Hard Disk Drive IT Management FAQ Scam Employee-Employer Relationship NFL eWaste Private Cloud Wireless Internet Marketing BYOD Retail Websites Uninterrupted Power Supply Samsung Value Wasting Time Identities Touchpad Data Privacy Windows 7 Data Loss Ciminal Going Green Social Amazon IT Solutions Charger Business Technology Device Security Legal Gamification Webinar Conferencing Data Theft Files Antivirus Consultant Accessory Legislation Language DDoS Software as a Service Adobe Workers Humor Hard Drive Display Remote Monitoring Recovery Virtual Assistant Disaster Testing Windows Ink Memory IT solutions Gifts Computing Computer Forensics Peripheral Comparison Bandwidth Licensing Updates Chromebook Co-Managed Services Microsoft Excel IT budget Administrator Emergency Alexa for Business iOS Outlook WIndows Server 2008 Camera Google Maps Spyware Streaming Media Reputation Financial Windows 10s HBO Credit Cards App store Lithium-ion battery Point of Sale Microsoft Word History Management Access Control Screen Mirroring Specifications Virus Data storage Computer Care Nanotechnology Identity Theft Printing Unified Threat Management Telephone File Sharing Access Remote Computing Health Projects Meetings Apple Chromecast Solid State Drive Vendor Root Cause Analysis Tablets Maintenance Wireless PowerPoint Emails Admin Cast Sales Proactive Telephony Settings USB Worker Compliance Office tips Printers How To Books Video Games Experience Education Hiring/Firing Advertising Work/Life Balance Virtual Reality Regulation Employer Employee Relationship Cache Current Events Electronic Medical Records Crowdsourcing Phone System Benefits HaaS Twitter Save Time End of Support Training Monitors Computer Accessories Relocation Television CrashOverride Flexibility Music Battery Smart Technology Personal Information Instant Messaging Hacker Company Culture Scalability Analytics PDF Entertainment Mobile Computing Thank You Keyboard Black Market Cleaning es Text Messaging Big Data Automobile Office Congratulations Managing Stress