Blog

Why Smart Cities May Not Be a Smart Idea Just Yet

Why Smart Cities May Not Be a Smart Idea Just Yet

As of this point, the vast majority of our experience with the Internet of Things has been on a small scale - accessories and appliances that connect to the Internet to gain some added functionality. This technology can also be applied to a larger, more civic purpose - the development of something called a “smart city.” Unfortunately, this application could prove to be as problematic as the IoT we are more accustomed to.

What a Smart City Should Be
On the surface, a smart city sounds like a great idea. Using technology and heavily leaning on Internet of Things principles, a smart city collects data and leverages it to improve public services, inform the local government’s actions, and generally improve the population’s contentedness. Traffic flows more smoothly, infrastructure is better maintained, and life is good.

At least, in theory.

There is an unfortunate tendency for consumer-focused IoT devices to be vulnerable to attack, a trait shared by the systems that control a smart city.

The Effects of an Attack
To fully grasp the influence that an attack on a smart city could have, it would help to take a closer look at some of the systems that a smart city would have in place. As we've established, the motivation behind a smart city is to improve the population’s quality of life, a goal that requires data collection and analysis to be reached.

This data will be collected via sensors that examine a wide variety of factors, like the weather, traffic conditions, and even air quality and radiation. While this data would once be delivered to human decision makers, automated systems would be able to make changes to resolve any issues. For example, if traffic was starting to become congested in a certain area, the surrounding traffic signals could be automatically manipulated to relieve the gridlock.

The trouble starts when these systems don’t have enough security to keep them safe from cyberattack, potentially leaving the city’s infrastructure wide open. In a preliminary study of three companies that could supply the systems that a smart city would be built upon, their products had 17 basic vulnerabilities - and we’re talking very basic vulnerabilities, like easily-guessed passwords, avoidable authentication requirements, and bugs that could let in malware.

Why This is Important
Speaking in a geopolitical sense, enacting a smart city with vulnerabilities like these is like painting a target on one’s back. You only have to look at the fairly recent attacks on both the energy grid and electoral systems of the United States for evidence that infrastructure and civic systems are considered very fair targets. While there are actions in process to shore up these vulnerabilities, opening up metropolitan areas to attack through obvious security flaws would not be a good idea.

Of course, we don’t mean to say that scaling the Internet of Things to a metropolitan scale is inherently not a good idea, either, it’s just there needs to be more security protecting the well-being of the populace that lives there. The same can be said of any business that relies on Internet-connected technology. If the devices and network components that a business uses aren’t patched and secured, that business is vulnerable.

White Mountain IT Services can help. Give us a call at 603-889-0800 to learn about our security solutions and how they can protect your business.

Related Articles

  • IoT Security is a Key Business Concern The Internet of Things is everywhere, which means that potential security risks are also everywhere. Your business needs to take the risks presented by the IoT into account and prepare accordingly. What are You Willing to Risk?When devising a policy for your company concerning the IoT, you need t...
  • Tip of the Week: Easy to Remember Tricks for Windows 10 Working with your computer for so much of the day means you need to get as much productivity out of it as possible. If you can speed up some of the ways you access specific information, you can get even more done. Shortcuts are very helpful to this end. Here are some of the easiest and best ways you...
  • Tip of the Week: Awareness Is Important When Surfing the Web We all love the Internet. We all use it almost every day. For this week’s tip, we’ll review a few ways to help keep yourself from getting in trouble while browsing. Sacrificing Security for ConvenienceFor starters, most of the threats to be found online are of the sort that can be avoided somewha...
  • Tip of the Week: Who Should Have Admin Accounts? Depending on their work roles within your organization, your employees will either have an ordinary user account or an administrator account. This can be one of the more stressful parts of managing a network, as the answer for who gets administrator access isn’t always clear. We’ll explain what an a...
  • Tip of the Week: How to Dominate OneNote Microsoft’s OneNote application is great for taking notes, but its functionality is much more than just that. We’ll be sharing some of our favorite tips and tricks to help you make the most of your OneNote. Of course, you might just think you can do the exact same thing with a simple pen and pad ...
  • Google’s Making Changes to Chrome, and Not Everyone’s Happy Chrome 70 is yet another example of how divisive technology has the potential to be. On the one hand, a few of the changes have people excited about some clear benefits to security, but others worry that Chrome will no longer be as secure or as user-friendly. We’ll review some of the changes coming ...
With the surge in the number of small and medium businesses that have fallen prey to malware and cyber criminals, there is a lot of focus of what an organization can do to prevent being a victim and how the company should handle themselves after an attack. There is another key factor to preventing cyber criminals from penetrating into your network:...

- Onsite Service Coverage Area -

Onsite Computer Support Services are available to businesses within 100 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH and then down into Boston. From Northern and Central Mass we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.

 

603-889-0800

White Mountain IT Services
33 Main Street Suite 302
Nashua, New Hampshire 03064

 

 padlock1  Cyber Security Toolkit

cloud desktop2 Cloud Desktop Login

Open Positions