Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Attempts to Make Smart Cities Hit a Snag

Attempts to Make Smart Cities Hit a Snag

At this point, the concept of the Internet of Things is a fairly familiar one, but that familiarity is to the Internet of Things on the micro scale--appliances with capabilities enhanced by an available connection to the Internet. There is another, more macro application to the Internet of Things: as a way to collect data in a municipal setting. However, like the IoT we are familiar with, these “smart cities” are host to many familiar problems.

The Concept of a Smart City
Like many technological developments, the idea of a smart city is built on good intentions. Through the use of technology (much of it based in the IoT), a smart city leverages collected data to functionally serve the public, embetter the services of government, and improve the quality of life for its citizenry.

That’s the idea, at least.

Unfortunately, like many of the ‘smart’ devices that the populace can interact with, the systems that these cities leverage tend to be susceptible to attack.

What These Attacks Could Do
In order to understand the potential ramifications of these kinds of attacks, it is important to first have an understanding of the kinds of systems that a smart city is built upon.

The true purpose behind creating a smart city is to make it a better place to live, and to do that, certain systems need to be put in place. These systems are powered by the data they collect. With that data, insights into correlated problems can be leveraged to solve them.

The sensors that these cities use to collect this data monitor a wide variety of factors, ranging from traffic conditions to the weather and even health-related factors like air quality and radiation. The data that is collected is then used, through the power of automation, to decide how to approach infrastructural concerns. For instance, if traffic is moving slowly in an area, these systems would deliver that data to decision-makers, allowing them to make the call to reroute traffic a different way to ease the congestion. This system just makes the decisions, too.

The big problem with this is that now, if these systems don’t have sufficient security measures in place, they leave the city’s infrastructure vulnerable to attack. Unfortunately, in an initial study of three companies who provide these kinds of smart city systems, 17 basic vulnerabilities were present in their products. These vulnerabilities included things like easily guessable passwords, bugs that could allow malware to be introduced, and opportunities for authentication requirements to be side-stepped.

Why This Matters
The harsh reality is that developing smart cities with these kinds of vulnerabilities is the geopolitical equivalent of intentionally wearing a “Kick Me” sign each and every time you went out in public. The United States of America have already learned this the hard way, as electoral systems and the energy grid have been hijacked recently. If appearances aren’t deceiving, actions are being taken to reinforce these vulnerabilities in these IoT devices, but it certainly doesn’t help if careless oversights are being made in the security of major metropolitan areas.

We’re not saying that bringing the Internet of Things to cities is a bad thing, but the security needs to be there. The same goes for businesses. If your business relies on devices that connect to the Internet, like physical security devices, smart appliances, and networking infrastructure, locking down these devices and keeping them patched is critical to keep your operations running without a hitch.

Give Total Tech Care a call at 866-348-2602 to learn about the security options we have to offer you.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 24 January 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Business Continuity Communication IT Support Smartphones Miscellaneous Smartphone Mobile Device Network Browser Small Business Productivity Collaboration Cybersecurity Quick Tips Users Business Management Upgrade Phishing Windows Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Office Server Cloud Computing Save Money Data Recovery Passwords Windows 10 Saving Money Holiday Social Media Gadgets Chrome Virtualization Tech Term Automation Managed IT Services Microsoft Office Managed Service Facebook Operating System Cybercrime Artificial Intelligence Computers BYOD Mobile Device Management Networking IT Support Internet of Things Health Hacking Wi-Fi Telephone Systems Remote Information Technology Managed Service Provider Covid-19 Alert Information Spam Office 365 Router Bandwidth BDR Employer-Employee Relationship Recovery Social Engineering Mobility Application App History Law Enforcement Big Data Human Resources Password Money Data Breach Remote Monitoring Mobile Computing Encryption Applications Office Tips How To Training Government VPN Private Cloud Blockchain Data Storage Patch Management Managed IT Paperless Office Remote Computing Apps Mobile Office Data Security Wireless Avoiding Downtime Gmail Settings Two-factor Authentication Vulnerability Bring Your Own Device Windows 7 Word Data Management Work/Life Balance Mouse Flexibility HaaS Marketing Servers Infrastructure Voice over Internet Protocol WiFi IT solutions Entertainment Website Google Drive Budget Sports Risk Management HIPAA USB Hacker Redundancy Data Protection Keyboard The Internet of Things Lithium-ion battery Vendor Managed Services Display Firewall Save Time Conferencing Staff Software as a Service Virtual Reality Employee/Employer Relationship Telephone System Scam Apple RMM Machine Learning Cleaning Connectivity Remote Work Social User Error Vendor Management Meetings End of Support Education Physical Security Safety Current Events Workplace Strategy Biometrics PDF Net Neutrality Remote Worker Telephony Virtual Desktop Help Desk Cryptocurrency Samsung Proactive IT Printing IT Consultant DDoS Value Best Practice YouTube Humor Comparison SharePoint Managed Services Provider Spam Blocking Black Market Electronic Medical Records CES Database Customer Service Hiring/Firing Content Management Document Management Environment Remote Workers Business Technology Wireless Technology Access Control Solid State Drive Fax Server How to Processor Downtime Virtual Assistant Authentication Hard Drive Data storage SaaS Automobile Business Intelligence Audit Worker Virus Update Network Congestion Computing IT Management Computing Infrastructure Going Green Unified Threat Management eWaste Botnet Computer Accessories Google Docs IT Plan Identity Theft Battery Shadow IT Unsupported Software Digital Signage Legal Wearable Technology Retail Hard Drives Charger Printer Internet Exlporer Instant Messaging Bluetooth Augmented Reality Excel Compliance Fraud Robot Procurement OneNote Computer Care Smart Tech Trending Social Network Investment Netflix Addiction Two Factor Authentication Amazon Employees Employee/Employer Relationships Root Cause Analysis Relocation Recycling Knowledge Practices Music Windows 365 HBO ISP Wiring Skype Video Games Science ROI Cache Amazon Web Services Video Conferencing Sales Worker Commute Bitcoin Data loss Shortcuts Safe Mode Criminal GDPR Leadership Hosted Computing Troubleshooting Point of Sale Experience Personal Outlook Cryptomining Customer Relationship Management Supply Chain Management Start Menu Scalability Wireless Internet Online Shopping Distributed Denial of Service Monitoring Business Owner Analyitcs Batteries Screen Mirroring File Sharing Loyalty Camera NarrowBand Inventory Books Specifications Windows 8.1 Programming Digitize Frequently Asked Questions Mobile Search Windows Server 2008 R2 Windows 10s Consultant Wire Evernote Travel Customer relationships Cast iPhone Analytics Manufacturing Printers webinar Emergency Millennials Antivirus Email Best Practices IT Assessment Tip of the week Professional Services Windows 8 Public Cloud Best Available Smart Office Employer Employee Relationship Wireless Charging IT service Computer Tips Managed IT Service Files WIndows 7 Security Cameras Assessment Biometric Security Virtual Private Network Chromecast Workforce Virtual CIO OneDrive Windows Server 2008 Peripheral Tools Tablet Cables Domains Digital Security Cameras Using Data Colocation Television Uninterrupted Power Supply 5G Project Management Nanotechnology Telecommuting Copiers Maintenance Quick Tip Monitor Cortana IaaS PowerPoint Digital Signature Windows Media Player Ergonomics Bloatware User Smartwatch Public Computer OLED Warranty Transportation Development Regulations PCI DSS Tablets Virtual Machine Computer Fan Reputation HVAC Rootkit Streaming Media Google Apps Tech Support Analysis 2FA Content Entrepreneur Fiber Optics Managing Stress Employee Techology Cabling Administrator Workers Laptop Devices Benefits Messaging Shortcut Policy Hypervisor FENG Customers Enterprise Content Management Cameras Accountants Dark mode Audiobook Cost Management Trend Micro MSP IBM Default App Microchip Touchpad Thought Leadership Smart Technology Credit Cards Social Networking SMS Flash Procedure Saving Time Password Management Password Manager Multi-Factor Security dark theme Politics Shopping Software Tips Advertising Google Search Supercomputer Sync IT Infrastructure Search Engine Emails Twitter Running Cable AI FinTech Memory Bing NIST Notifications Printer Server Business Mangement

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code