Home

About Us

IT Services

Understanding IT

News & Events

Blog

Support

Contact Us

(702) 720-1700

Blog
  • Register

Agilitec IT Blog

3 minutes reading time (545 words)

Why Smart Cities May Not Be a Smart Idea Just Yet

Why Smart Cities May Not Be a Smart Idea Just Yet

As of this point, the vast majority of our experience with the Internet of Things has been on a small scale - accessories and appliances that connect to the Internet to gain some added functionality. This technology can also be applied to a larger, more civic purpose - the development of something called a “smart city.” Unfortunately, this application could prove to be as problematic as the IoT we are more accustomed to.

What a Smart City Should Be
On the surface, a smart city sounds like a great idea. Using technology and heavily leaning on Internet of Things principles, a smart city collects data and leverages it to improve public services, inform the local government’s actions, and generally improve the population’s contentedness. Traffic flows more smoothly, infrastructure is better maintained, and life is good.

At least, in theory.

There is an unfortunate tendency for consumer-focused IoT devices to be vulnerable to attack, a trait shared by the systems that control a smart city.

The Effects of an Attack
To fully grasp the influence that an attack on a smart city could have, it would help to take a closer look at some of the systems that a smart city would have in place. As we've established, the motivation behind a smart city is to improve the population’s quality of life, a goal that requires data collection and analysis to be reached.

This data will be collected via sensors that examine a wide variety of factors, like the weather, traffic conditions, and even air quality and radiation. While this data would once be delivered to human decision makers, automated systems would be able to make changes to resolve any issues. For example, if traffic was starting to become congested in a certain area, the surrounding traffic signals could be automatically manipulated to relieve the gridlock.

The trouble starts when these systems don’t have enough security to keep them safe from cyberattack, potentially leaving the city’s infrastructure wide open. In a preliminary study of three companies that could supply the systems that a smart city would be built upon, their products had 17 basic vulnerabilities - and we’re talking very basic vulnerabilities, like easily-guessed passwords, avoidable authentication requirements, and bugs that could let in malware.

Why This is Important
Speaking in a geopolitical sense, enacting a smart city with vulnerabilities like these is like painting a target on one’s back. You only have to look at the fairly recent attacks on both the energy grid and electoral systems of the United States for evidence that infrastructure and civic systems are considered very fair targets. While there are actions in process to shore up these vulnerabilities, opening up metropolitan areas to attack through obvious security flaws would not be a good idea.

Of course, we don’t mean to say that scaling the Internet of Things to a metropolitan scale is inherently not a good idea, either, it’s just there needs to be more security protecting the well-being of the populace that lives there. The same can be said of any business that relies on Internet-connected technology. If the devices and network components that a business uses aren’t patched and secured, that business is vulnerable.

Agilitec IT can help. Give us a call at (702) 720-1700 to learn about our security solutions and how they can protect your business.

Do You Know How to Determine Your Computing Needs?
Tip of the Week: Evernote as a Productivity Tool
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, September 25, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Network Security Tip of the Week Security Technology Privacy Tech Term Internet Internet of Things Mobile Devices Best Practices Communications Business Management Efficiency Productivity IT Support Data Backup Data Recovery Managed IT Services User Tips BDR Email VoIp Business Malware Cybersecurity Small Business Data Saving Money Hardware Communication Router Browser Backup Information Collaboration Google Managed IT services Business Computing Smartphones Hackers Vulnerability Managed Service Data Breach Users Cost Management Bring Your Own Device Passwords Innovation Devices Redundancy Automation Cloud Windows 10 Software MSP Networking Outsourced IT Network Mobile Device Cloud Computing Value Wireless Charging Spam App Augmented Reality Financial Technology Windows Smartphone Data loss Update Data Privacy Travel Office 365 Project Management Streaming Media Managed Service Provider Mobile Device Management Cleaning Jun 27 2018 11:00 AM Pacific Marketing Disaster Recovery OneNote Applications History Budget Instant Messaging The Internet of Things Vendor IT Services Holiday Microsoft Word Workplace Tips Virtualization Content Filter O 365 versions Cortana Social Media Operating System Remote Computing Evernote SaaS Printing Hybrid Cloud Projects Antivirus Best Practice WPA3 Big Data Employee-Employer Relationship Wireless Internet Amazon Cybercrime Maintenance Flexibility Computing Monitoring backup files Chromebook Unified Communications Software as a Service Wireless Technology Spyware Education File Storage Analysis Testing IoT Gamification Virtual Assistant Server Management Bandwidth Apps Office Online Two-factor Authentication Smart Tech Google Assistant Business Technology Charger Students WannaCry Microsoft Office Blockchain Hosted Solutions Money Camera eWaste Computer Alexa for Business Excel Alert Upgrade intranet Android Workers Law Enforcement team chat Phishing Updates Connectivity Microsoft Risk Management Wasting Money Tech Support Data Protection Compliance Financial Quick Tips Memory PowerPoint Ransomware Twitter Fraud Websites Employer-Employee Relationship Thank You Device Security Virus Remote Monitoring Social Engineering App store Computer Forensics Hard Drive Congratulations Artificial Intelligence IT budget Company Culture Data Security Mobile Security Edge Patch Management Gadgets Printers Proactive Managing Stress Regulation Identity Gmail Legal Data Theft Business Continuity Wi-Fi Application Language Identities Vendor Management Ciminal Safety

Latest News & Events

Join Us On July 25, 2018 At 11AM Pacific Time For A Free 30-Minute Educational Webinar On How To Reduce The Number Of Meetings You Have And Make The Meetings You Do Have Much More Effective.  AgendaIntroMicrosoft Teams and Office ...

Contact Us

Learn more about what Agilitec IT can do for your business.

Call Us Today
Call us today
(702) 720-1700

5215 Ponderosa Way
Suite D

Las Vegas, Nevada 89118