Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Attempts to Make Smart Cities Hit a Snag

Attempts to Make Smart Cities Hit a Snag

At this point, the concept of the Internet of Things is a fairly familiar one, but that familiarity is to the Internet of Things on the micro scale--appliances with capabilities enhanced by an available connection to the Internet. There is another, more macro application to the Internet of Things: as a way to collect data in a municipal setting. However, like the IoT we are familiar with, these “smart cities” are host to many familiar problems.

The Concept of a Smart City
Like many technological developments, the idea of a smart city is built on good intentions. Through the use of technology (much of it based in the IoT), a smart city leverages collected data to functionally serve the public, embetter the services of government, and improve the quality of life for its citizenry.

That’s the idea, at least.

Unfortunately, like many of the ‘smart’ devices that the populace can interact with, the systems that these cities leverage tend to be susceptible to attack.

What These Attacks Could Do
In order to understand the potential ramifications of these kinds of attacks, it is important to first have an understanding of the kinds of systems that a smart city is built upon.

The true purpose behind creating a smart city is to make it a better place to live, and to do that, certain systems need to be put in place. These systems are powered by the data they collect. With that data, insights into correlated problems can be leveraged to solve them.

The sensors that these cities use to collect this data monitor a wide variety of factors, ranging from traffic conditions to the weather and even health-related factors like air quality and radiation. The data that is collected is then used, through the power of automation, to decide how to approach infrastructural concerns. For instance, if traffic is moving slowly in an area, these systems would deliver that data to decision-makers, allowing them to make the call to reroute traffic a different way to ease the congestion. This system just makes the decisions, too.

The big problem with this is that now, if these systems don’t have sufficient security measures in place, they leave the city’s infrastructure vulnerable to attack. Unfortunately, in an initial study of three companies who provide these kinds of smart city systems, 17 basic vulnerabilities were present in their products. These vulnerabilities included things like easily guessable passwords, bugs that could allow malware to be introduced, and opportunities for authentication requirements to be side-stepped.

Why This Matters
The harsh reality is that developing smart cities with these kinds of vulnerabilities is the geopolitical equivalent of intentionally wearing a “Kick Me” sign each and every time you went out in public. The United States of America have already learned this the hard way, as electoral systems and the energy grid have been hijacked recently. If appearances aren’t deceiving, actions are being taken to reinforce these vulnerabilities in these IoT devices, but it certainly doesn’t help if careless oversights are being made in the security of major metropolitan areas.

We’re not saying that bringing the Internet of Things to cities is a bad thing, but the security needs to be there. The same goes for businesses. If your business relies on devices that connect to the Internet, like physical security devices, smart appliances, and networking infrastructure, locking down these devices and keeping them patched is critical to keep your operations running without a hitch.

Give Total Tech Care a call at 866-348-2602 to learn about the security options we have to offer you.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications IT Support Smartphones Communication Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Quick Tips Cybersecurity Business Management Users Upgrade Managed IT Services Phishing Windows Outsourced IT Ransomware Data Backup Windows 10 Server Save Money Data Recovery Office Cloud Computing Windows 10 Passwords Chrome Gadgets Virtualization Social Media Saving Money Holiday Tech Term Managed IT Services Microsoft Office Automation Managed Service Operating System Facebook Artificial Intelligence Computers Cybercrime Networking IT Support Hacking Internet of Things Wi-Fi Health BYOD Mobile Device Management Spam Managed Service Provider Office 365 Remote Telephone Systems Alert Information Technology Information Covid-19 Bandwidth Router BDR Social Engineering Mobility Recovery Employer-Employee Relationship Applications Remote Monitoring Law Enforcement Big Data Data Breach App History Mobile Computing Password Money Human Resources Application Encryption Data Storage Patch Management Mobile Office Government Private Cloud Office Tips Training Blockchain Managed IT Paperless Office VPN Apps How To Remote Computing Google Drive Mouse HaaS Vulnerability Windows 7 Word Avoiding Downtime Servers Wireless Flexibility Data Security Marketing Gmail Bring Your Own Device Data Management Work/Life Balance WiFi Settings IT solutions Entertainment Website Infrastructure Budget Two-factor Authentication Voice over Internet Protocol Safety Social HIPAA Sports Conferencing Redundancy User Error Keyboard Data Protection Scam Meetings Risk Management Vendor Management Hacker Save Time The Internet of Things Vendor Lithium-ion battery Telephone System Staff Software as a Service Managed Services Display Machine Learning Cleaning Connectivity Remote Work Firewall Employee/Employer Relationship End of Support USB RMM Virtual Reality Physical Security Education Apple Network Congestion Fraud eWaste Humor Remote Worker PDF Cryptocurrency Digital Signage Business Intelligence Proactive IT Audit Worker Best Practice Wearable Technology IT Management Retail YouTube Hard Drives Comparison Procurement Black Market Instant Messaging Robot Net Neutrality CES Excel Workplace Strategy Botnet IT Plan Biometrics Help Desk Printing Business Technology Virtual Desktop Content Management Document Management Unsupported Software Solid State Drive Access Control Wireless Technology Virus How to Downtime Virtual Assistant Charger DDoS Unified Threat Management Managed Services Provider Authentication Compliance Computer Accessories SharePoint Data storage OneNote Database Computer Care Automobile Current Events Telephony Remote Workers Computing Infrastructure Customer Service Samsung Update Processor Going Green Environment Printer Fax Server Value Google Docs Bluetooth Hard Drive Identity Theft Electronic Medical Records Battery Spam Blocking SaaS Shadow IT Legal Hiring/Firing Computing Augmented Reality Internet Exlporer IT Consultant PCI DSS Search Engine Tip of the week Virtual Machine Twitter webinar Bloatware Emergency NIST Public Cloud Employee Business Mangement Employer Employee Relationship Notifications 2FA Professional Services Fiber Optics Messaging Cabling Smart Tech Assessment Tablets Trending Amazon Policy Windows Server 2008 Hypervisor Addiction Entrepreneur Relocation Recycling Dark mode Tools Trend Micro SMS Wiring Shortcut Default App Practices Television Amazon Web Services Consultant Procedure Video Games Saving Time Cache Cost Management Safe Mode Social Networking Google Search Criminal dark theme Analytics Worker Commute Shopping Experience AI GDPR IT Infrastructure Hosted Computing Public Computer Online Shopping Transportation Best Available FinTech Regulations Scalability Wireless Internet Bing File Sharing Computer Fan Rootkit WIndows 7 Business Owner Running Cable Social Network Camera Investment Inventory NarrowBand Memory Specifications Evernote Benefits Employees Search Employee/Employer Relationships Wire Workers FENG iPhone ISP Travel Windows 365 Video Conferencing Printers ROI IBM Millennials Shortcuts Wireless Charging Smart Technology Sales Flash Bitcoin Smart Office Personal Windows Media Player Files Cryptomining Science User Point of Sale PowerPoint Supply Chain Management Virtual Private Network Software Tips Supercomputer Chromecast Workforce Cables Monitoring Sync Batteries Emails Digitize Colocation Customer Relationship Management Uninterrupted Power Supply Managing Stress Windows 8.1 Distributed Denial of Service Project Management Windows Server 2008 R2 Nanotechnology Analyitcs Telecommuting Cortana Two Factor Authentication Customer relationships Cameras Netflix Monitor Programming IT Assessment Root Cause Analysis Manufacturing Digital Signature Email Best Practices Warranty HBO Knowledge Music Reputation Security Cameras Google Apps Streaming Media Computer Tips Skype Antivirus Managed IT Service HVAC Content OneDrive Data loss Biometric Security Analysis Tech Support Windows 8 Virtual CIO Peripheral Administrator Outlook Techology IT service Devices Leadership Laptop Troubleshooting Customers Digital Security Cameras Start Menu Printer Server Using Data Enterprise Content Management Audiobook Copiers MSP Screen Mirroring 5G Accountants Loyalty Tablet Quick Tip Microchip Frequently Asked Questions Domains Thought Leadership Touchpad Credit Cards Books Smartwatch Password Manager Ergonomics Mobile Password Management Windows 10s Politics IaaS Development Cast Advertising Maintenance OLED Multi-Factor Security

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code