Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Attempts to Make Smart Cities Hit a Snag

Attempts to Make Smart Cities Hit a Snag

At this point, the concept of the Internet of Things is a fairly familiar one, but that familiarity is to the Internet of Things on the micro scale--appliances with capabilities enhanced by an available connection to the Internet. There is another, more macro application to the Internet of Things: as a way to collect data in a municipal setting. However, like the IoT we are familiar with, these “smart cities” are host to many familiar problems.

The Concept of a Smart City
Like many technological developments, the idea of a smart city is built on good intentions. Through the use of technology (much of it based in the IoT), a smart city leverages collected data to functionally serve the public, embetter the services of government, and improve the quality of life for its citizenry.

That’s the idea, at least.

Unfortunately, like many of the ‘smart’ devices that the populace can interact with, the systems that these cities leverage tend to be susceptible to attack.

What These Attacks Could Do
In order to understand the potential ramifications of these kinds of attacks, it is important to first have an understanding of the kinds of systems that a smart city is built upon.

The true purpose behind creating a smart city is to make it a better place to live, and to do that, certain systems need to be put in place. These systems are powered by the data they collect. With that data, insights into correlated problems can be leveraged to solve them.

The sensors that these cities use to collect this data monitor a wide variety of factors, ranging from traffic conditions to the weather and even health-related factors like air quality and radiation. The data that is collected is then used, through the power of automation, to decide how to approach infrastructural concerns. For instance, if traffic is moving slowly in an area, these systems would deliver that data to decision-makers, allowing them to make the call to reroute traffic a different way to ease the congestion. This system just makes the decisions, too.

The big problem with this is that now, if these systems don’t have sufficient security measures in place, they leave the city’s infrastructure vulnerable to attack. Unfortunately, in an initial study of three companies who provide these kinds of smart city systems, 17 basic vulnerabilities were present in their products. These vulnerabilities included things like easily guessable passwords, bugs that could allow malware to be introduced, and opportunities for authentication requirements to be side-stepped.

Why This Matters
The harsh reality is that developing smart cities with these kinds of vulnerabilities is the geopolitical equivalent of intentionally wearing a “Kick Me” sign each and every time you went out in public. The United States of America have already learned this the hard way, as electoral systems and the energy grid have been hijacked recently. If appearances aren’t deceiving, actions are being taken to reinforce these vulnerabilities in these IoT devices, but it certainly doesn’t help if careless oversights are being made in the security of major metropolitan areas.

We’re not saying that bringing the Internet of Things to cities is a bad thing, but the security needs to be there. The same goes for businesses. If your business relies on devices that connect to the Internet, like physical security devices, smart appliances, and networking infrastructure, locking down these devices and keeping them patched is critical to keep your operations running without a hitch.

Give Total Tech Care a call at 866-348-2602 to learn about the security options we have to offer you.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications IT Support Smartphones Communication Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Cybersecurity Quick Tips Business Management Users Upgrade Managed IT Services Windows Phishing Outsourced IT Ransomware Data Backup Windows 10 Server Save Money Data Recovery Office Cloud Computing Passwords Windows 10 Chrome Social Media Virtualization Gadgets Tech Term Saving Money Holiday Microsoft Office Automation Managed IT Services Managed Service Operating System Facebook Computers Cybercrime Artificial Intelligence Networking IT Support Hacking Internet of Things Health BYOD Wi-Fi Mobile Device Management Spam Office 365 Remote Managed Service Provider Telephone Systems Information Technology Covid-19 Information Alert Bandwidth Social Engineering Mobility Router BDR Recovery Employer-Employee Relationship Remote Monitoring Money Encryption Applications Big Data App History Data Breach Law Enforcement Mobile Computing Human Resources Application Password Apps Data Storage Patch Management Office Tips Training Blockchain Paperless Office Government VPN Private Cloud How To Remote Computing Managed IT Mobile Office Vulnerability Windows 7 Word Google Drive Wireless Servers Avoiding Downtime Gmail Flexibility Settings Marketing Data Security WiFi Infrastructure IT solutions Two-factor Authentication Voice over Internet Protocol Entertainment Website Budget Bring Your Own Device Mouse Data Management HaaS Work/Life Balance User Error Data Protection Meetings Conferencing End of Support Scam Education Physical Security Safety Risk Management Hacker Sports HIPAA Redundancy Vendor Vendor Management Keyboard The Internet of Things Lithium-ion battery Managed Services Telephone System Staff Software as a Service Display Machine Learning Connectivity Remote Work Firewall Employee/Employer Relationship RMM Save Time Virtual Reality Apple USB Social Cleaning Cryptocurrency Humor Wearable Technology Procurement Battery Shadow IT Workplace Strategy Retail Hard Drives Comparison Net Neutrality Instant Messaging Legal Business Intelligence Robot CES Excel Help Desk Audit Internet Exlporer Worker Printing Biometrics IT Management Business Technology Virtual Desktop Content Management PDF Access Control Botnet Managed Services Provider IT Plan DDoS Virtual Assistant Proactive IT Authentication Database Unsupported Software SharePoint Best Practice Remote Workers Virus YouTube Charger Processor Unified Threat Management Black Market Compliance Customer Service Computer Accessories Update OneNote Computer Care Environment Hard Drive Current Events Fax Server Document Management Telephony Google Docs Identity Theft Solid State Drive Wireless Technology Samsung How to Downtime SaaS Computing Printer Value Bluetooth Data storage Electronic Medical Records Augmented Reality Automobile Spam Blocking Fraud Network Congestion eWaste Hiring/Firing Remote Worker Digital Signage Computing Infrastructure Going Green IT Consultant Procedure Recycling Saving Time Tip of the week Reputation webinar Streaming Media Emergency Public Cloud Tech Support Employer Employee Relationship Wiring dark theme Shortcut Practices Shopping Content Professional Services Google Search Cost Management Amazon Web Services IT Infrastructure Techology Laptop Assessment Cache AI Safe Mode FinTech Social Networking Criminal Windows Server 2008 Bing Customers GDPR Hosted Computing Social Network Audiobook Tools Online Shopping Investment Touchpad Television Wireless Internet Running Cable File Sharing Employees Consultant Employee/Employer Relationships Advertising Camera Windows 365 Inventory Analytics Politics Memory Specifications ISP Evernote ROI Public Computer Wire Video Conferencing Notifications Transportation Sales Best Available Bitcoin Regulations Travel Shortcuts Computer Fan Rootkit Printers Point of Sale WIndows 7 Personal Millennials Cryptomining Wireless Charging Smart Office Supply Chain Management Benefits Monitoring Batteries Science Relocation Workers FENG Virtual Private Network Windows 8.1 Digitize Workforce Cables Windows Server 2008 R2 Video Games IBM Smart Technology Distributed Denial of Service Customer relationships Customer Relationship Management Worker Commute Flash Project Management Email Best Practices User Nanotechnology IT Assessment PowerPoint Experience Analyitcs Telecommuting Manufacturing Windows Media Player Programming Cortana Scalability Software Tips Supercomputer Computer Tips Digital Signature Managed IT Service Business Owner Sync Security Cameras Emails NarrowBand Warranty Virtual CIO Managing Stress OneDrive Biometric Security HVAC Peripheral Google Apps Search Antivirus Two Factor Authentication Digital Security Cameras Analysis Using Data Cameras Windows 8 iPhone Netflix 5G Root Cause Analysis Administrator IT service Devices Copiers Enterprise Content Management Quick Tip HBO Knowledge Music MSP Ergonomics Accountants Skype Tablet Smartwatch Files Credit Cards OLED Data loss Chromecast Microchip Domains Thought Leadership Development Password Management PCI DSS Password Manager Virtual Machine Outlook Leadership Troubleshooting Uninterrupted Power Supply IaaS 2FA Maintenance Fiber Optics Printer Server Start Menu Multi-Factor Security Employee Colocation Bloatware Cabling Screen Mirroring Loyalty Search Engine Twitter Messaging NIST Policy Business Mangement Hypervisor Frequently Asked Questions Monitor Books Dark mode Smart Tech Trend Micro Mobile Tablets Trending Windows 10s Entrepreneur Amazon Default App Cast Addiction SMS

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code