5G Renders Smart Cities More Vulnerable To Attacks

Smart cities could transform urban living for the better and from a technological perspective, smart cities can be termed synonymous with digital cities, intelligent cities, wired cities, hybrid cities or information cities. 

The ubiquitous connectivity made possible with 5G and IoT will be the primary driver of the first “true” smart cities of the future.  However, in order to mitigate the risks of cyber threats that can be exacerbated by inadequately secured and Mobile Edge Computing (MEC) technologies, government officials should be aware of smart cities security concerns associated with their supporting infrastructure. 

Now, the Five Eyes security alliance is warning of the security risks posed by the widespread use of 5G technology in Smart Cities and the US Cybersecurity & Infrastructure Security Agency (CISA) has led the way in formulating a new set of guidelines warning about the security risks posed by the use of 5G technology in Smart Cities.

A smart city uses technologies and networking to help improve local services and infrastructure management. For example, a smart city can harness the power of the Internet of Things (IoT), MEC and faster networking, such as 4G LTE and 5G, to reduce operational costs and provide better, faster services and information-sharing.

Typically, a smart city collects data using a web of IoT-connected sensors to gather insights about how residents use the environment and access services. This data helps inform decision-makers so resources can be more appropriately allocated. The Australian Signals Directorate (ASD) has expressed concerns that align with these warnings of the Five Eyes security alliance, which has warned that the interconnected nature of a fully connected city makes it vulnerable to cyber attacks. 

While Smart Cities offer benefits such as increased efficiency and data-driven decision-making, the downside is that they may expose national and economic security, public health and safety, and critical infrastructure operations to potential vulnerabilities. As Smart Cities become more advanced, they must be able to adapt to the changing cyber landscape in order to protect ourselves from emerging threats. “The intrinsic value of the large data sets and potential vulnerabilities in digital systems means there is a risk of exploitation for espionage and for financial or political gain by malicious threat actors, including nation-states, cybercriminals, hacktivists, insider threats, and terrorists.. ” CISA says.

The risks associated with smart cities are not new. In 2020, the US National Security Agency (NSA) warned that 5G technology used in smart cities could create new attack vectors for hackers, including the potential to disrupt critical infrastructure.

The UK’s National Cyber Security Centre (NCSC) has also highlighted the risks of smart city technology, including the potential for attacks on autonomous vehicles and the use of data to target individuals. 

To address these risks, the CISA guidelines recommend that smart cities adopt a risk management approach that includes identifying potential vulnerabilities and implementing appropriate security measures.

Verizon:    CISA:   I-HLS:     CircloidCircleID:   Independent  Australia:    GovTech:    Palo Alto Networks:   The Mandarin

You Might Also Read: 

Smart Cities Will Soon Be Under Attack:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« British Banks Warn Of A Spike In Online Scams
Mobile Phone Chip Company Collects User’s Private Data »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Kaseya

Kaseya

Kaseya is a premier provider of unified IT management and security software for managed service providers (MSPs) and small to medium-sized businesses (SMBS).

Semperis

Semperis

Semperis is an enterprise identity protection company that enables organizations to quickly recover from accidental or malicious changes and disasters that compromise Active Directory.

CICRA

CICRA

CICRA is Sri Lanka's pioneering cyber security training and consultancy provider.

SGBox

SGBox

SGBox is a highly flexible and scalable solution for IT security. Choose the modules which your company needs and implement it without any modification to your network infrastructure.

Ntirety

Ntirety

Ntirety Managed Security Services offer enterprise businesses the advanced tools, processes, and support to ensure your infrastructure, networks, and mission-critical applications are secure.

FraudWatch International

FraudWatch International

FraudWatch has been protecting client brands around the world since 2003, and are the leaders in online brand protection from phishing, malware, social media and mobile apps impersonation.

Keyavi Data

Keyavi Data

With Keyavi’s evolutionary data protection technology, your data stays within the bounds of your control in perpetuity.

Force Majeure

Force Majeure

Force Majeure specializes in cybersecurity, incident response, and digital forensics, with experience spanning more than a decade.

Maritime Cyber Threats Research Group - University of Plymouth

Maritime Cyber Threats Research Group - University of Plymouth

The Maritime Cyber Threats research group of the University of Plymouth is focused on investigating marine cyber threats and researching solutions.

Searchlight Cyber

Searchlight Cyber

Searchlight Cyber is a leading darknet intelligence company. Working with law enforcement, industry, and end users to help protect society against the threats of the darknet.

Centroid

Centroid

Centroid is a cloud services and technology company that provides Oracle enterprise workload consulting and managed services across Oracle, Azure, Amazon, Google, and private cloud.

CatchProbe Intelligence Technologies

CatchProbe Intelligence Technologies

CatchProbe provides actionable web intelligence, OSINT, deception systems, threat intelligence, and digital crime analytics solutions and products through an AI-Driven intelligence platform.

Lightpoint Global

Lightpoint Global

Lightpoint Global is a bespoke software development company. We also provide a spectrum of services such as IT consulting, business analysis, QA and testing, and DevOps services.

VT Group (VTG)

VT Group (VTG)

VTG delivers force modernization and digital transformation solutions that expand America’s competitive advantage in the modern battlespace.

Synergy ECP

Synergy ECP

Synergy ECP has a talented, dedicated staff to provide a broad range of services to the defense and intelligence industries.

Advanced IT

Advanced IT

Reliable managed IT Security & support services that will help you take your business operations to the next level without breaking the bank!