Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Attempts to Make Smart Cities Hit a Snag

Attempts to Make Smart Cities Hit a Snag

At this point, the concept of the Internet of Things is a fairly familiar one, but that familiarity is to the Internet of Things on the micro scale--appliances with capabilities enhanced by an available connection to the Internet. There is another, more macro application to the Internet of Things: as a way to collect data in a municipal setting. However, like the IoT we are familiar with, these “smart cities” are host to many familiar problems.

The Concept of a Smart City
Like many technological developments, the idea of a smart city is built on good intentions. Through the use of technology (much of it based in the IoT), a smart city leverages collected data to functionally serve the public, embetter the services of government, and improve the quality of life for its citizenry.

That’s the idea, at least.

Unfortunately, like many of the ‘smart’ devices that the populace can interact with, the systems that these cities leverage tend to be susceptible to attack.

What These Attacks Could Do
In order to understand the potential ramifications of these kinds of attacks, it is important to first have an understanding of the kinds of systems that a smart city is built upon.

The true purpose behind creating a smart city is to make it a better place to live, and to do that, certain systems need to be put in place. These systems are powered by the data they collect. With that data, insights into correlated problems can be leveraged to solve them.

The sensors that these cities use to collect this data monitor a wide variety of factors, ranging from traffic conditions to the weather and even health-related factors like air quality and radiation. The data that is collected is then used, through the power of automation, to decide how to approach infrastructural concerns. For instance, if traffic is moving slowly in an area, these systems would deliver that data to decision-makers, allowing them to make the call to reroute traffic a different way to ease the congestion. This system just makes the decisions, too.

The big problem with this is that now, if these systems don’t have sufficient security measures in place, they leave the city’s infrastructure vulnerable to attack. Unfortunately, in an initial study of three companies who provide these kinds of smart city systems, 17 basic vulnerabilities were present in their products. These vulnerabilities included things like easily guessable passwords, bugs that could allow malware to be introduced, and opportunities for authentication requirements to be side-stepped.

Why This Matters
The harsh reality is that developing smart cities with these kinds of vulnerabilities is the geopolitical equivalent of intentionally wearing a “Kick Me” sign each and every time you went out in public. The United States of America have already learned this the hard way, as electoral systems and the energy grid have been hijacked recently. If appearances aren’t deceiving, actions are being taken to reinforce these vulnerabilities in these IoT devices, but it certainly doesn’t help if careless oversights are being made in the security of major metropolitan areas.

We’re not saying that bringing the Internet of Things to cities is a bad thing, but the security needs to be there. The same goes for businesses. If your business relies on devices that connect to the Internet, like physical security devices, smart appliances, and networking infrastructure, locking down these devices and keeping them patched is critical to keep your operations running without a hitch.

Give Total Tech Care a call at 866-348-2602 to learn about the security options we have to offer you.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 25 April 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications Smartphones IT Support Communication Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Phishing Managed IT Services Upgrade Windows Outsourced IT Data Backup Ransomware Windows 10 Save Money Cloud Computing Office Data Recovery Server Passwords Windows 10 Gadgets Chrome Tech Term Virtualization Social Media Saving Money Holiday Managed Service Microsoft Office Automation Managed IT Services Operating System Artificial Intelligence Computers Facebook Cybercrime Hacking Wi-Fi BYOD Mobile Device Management Health Networking IT Support Internet of Things Information Managed Service Provider Spam Alert Office 365 Telephone Systems Information Technology Remote Covid-19 Social Engineering Mobility Employer-Employee Relationship Recovery Router Bandwidth BDR Remote Monitoring Big Data Password Money App History Mobile Computing Encryption Data Breach Applications Application Human Resources Law Enforcement Mobile Office Managed IT Data Storage Patch Management Apps Office Tips Training VPN Government Blockchain Paperless Office Remote Computing How To Private Cloud HaaS Infrastructure Bring Your Own Device Voice over Internet Protocol Data Management Work/Life Balance Flexibility Vulnerability Windows 7 Marketing Word Wireless WiFi IT solutions Entertainment Servers Website Gmail Budget Google Drive Settings Data Security Two-factor Authentication Avoiding Downtime Mouse Connectivity Remote Work User Error Save Time Employee/Employer Relationship Meetings RMM Cleaning Conferencing Risk Management Hacker Scam End of Support The Internet of Things Data Protection Lithium-ion battery Education Physical Security Safety Vendor Management Sports USB HIPAA Redundancy Firewall Keyboard Vendor Virtual Reality Apple Managed Services Telephone System Staff Software as a Service Display Machine Learning Social Solid State Drive Wireless Technology Update How to Spam Blocking Downtime Electronic Medical Records Hard Drive Google Docs Data storage Hiring/Firing Identity Theft Wearable Technology Automobile Retail Computing Hard Drives Virus Instant Messaging Robot Computing Infrastructure Excel Augmented Reality Unified Threat Management Going Green Computer Accessories Biometrics Fraud Business Intelligence Virtual Desktop Remote Worker Digital Signage Worker Battery Audit IT Management Cryptocurrency Shadow IT DDoS Legal Botnet SharePoint Printer IT Plan Procurement Internet Exlporer Bluetooth Workplace Strategy Comparison Net Neutrality Unsupported Software Customer Service PDF CES Help Desk Printing Environment Charger Business Technology Fax Server Content Management Proactive IT IT Consultant Access Control Compliance Computer Care Managed Services Provider Best Practice OneNote Virtual Assistant Humor Current Events YouTube SaaS Telephony Authentication Black Market Database Samsung Remote Workers Network Congestion Value Processor eWaste Document Management Outlook Computer Tips Leadership Digital Signature Managed IT Service Tablets Troubleshooting Security Cameras Start Menu Warranty Virtual CIO Best Available OneDrive Entrepreneur Biometric Security Loyalty Google Apps WIndows 7 Screen Mirroring HVAC Peripheral Files Frequently Asked Questions Digital Security Cameras Shortcut Analysis Using Data Chromecast Books Mobile Administrator Windows 10s Devices Copiers Cost Management 5G Social Networking Colocation Uninterrupted Power Supply Cast Enterprise Content Management Quick Tip Tip of the week MSP Ergonomics webinar Accountants Emergency Smartwatch Professional Services Microchip Public Cloud Thought Leadership Development Monitor Employer Employee Relationship Credit Cards OLED PowerPoint Assessment Password Manager Virtual Machine Windows Media Player User Running Cable Password Management PCI DSS Windows Server 2008 2FA Fiber Optics Memory Multi-Factor Security Employee Streaming Media Tools Search Engine Twitter Messaging Reputation Cabling NIST Policy Television Business Mangement Hypervisor Tech Support Managing Stress Content Dark mode Techology Smart Tech Trend Micro Laptop Trending Amazon Default App Addiction SMS Cameras Customers Procedure Public Computer Recycling Saving Time Science Audiobook Regulations Wiring dark theme Practices Shopping Touchpad Transportation Google Search Rootkit Amazon Web Services IT Infrastructure Computer Fan Cache AI Safe Mode FinTech Customer Relationship Management Advertising Criminal Bing Distributed Denial of Service Politics GDPR Workers Hosted Computing Social Network Analyitcs Benefits Online Shopping Investment Notifications FENG Wireless Internet Printer Server Programming File Sharing Employees IBM Employee/Employer Relationships Flash Camera Windows 365 Inventory Smart Technology Specifications ISP Evernote ROI Antivirus Wire Video Conferencing Relocation Software Tips Sales Supercomputer Bitcoin Windows 8 Travel Shortcuts Sync Printers Point of Sale IT service Video Games Emails Personal Millennials Cryptomining Wireless Charging Worker Commute Smart Office Supply Chain Management Monitoring Batteries Tablet Experience Virtual Private Network Windows 8.1 Domains Scalability Netflix Digitize Two Factor Authentication Workforce Cables Windows Server 2008 R2 Business Owner Root Cause Analysis HBO Customer relationships Maintenance Knowledge NarrowBand Music IaaS Skype Project Management Email Best Practices Consultant Search Nanotechnology IT Assessment Bloatware Telecommuting Manufacturing Cortana Data loss Analytics iPhone

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code