5G Renders Smart Cities More Vulnerable To Attacks

Smart cities could transform urban living for the better and from a technological perspective, smart cities can be termed synonymous with digital cities, intelligent cities, wired cities, hybrid cities or information cities. 

The ubiquitous connectivity made possible with 5G and IoT will be the primary driver of the first “true” smart cities of the future.  However, in order to mitigate the risks of cyber threats that can be exacerbated by inadequately secured and Mobile Edge Computing (MEC) technologies, government officials should be aware of smart cities security concerns associated with their supporting infrastructure. 

Now, the Five Eyes security alliance is warning of the security risks posed by the widespread use of 5G technology in Smart Cities and the US Cybersecurity & Infrastructure Security Agency (CISA) has led the way in formulating a new set of guidelines warning about the security risks posed by the use of 5G technology in Smart Cities.

A smart city uses technologies and networking to help improve local services and infrastructure management. For example, a smart city can harness the power of the Internet of Things (IoT), MEC and faster networking, such as 4G LTE and 5G, to reduce operational costs and provide better, faster services and information-sharing.

Typically, a smart city collects data using a web of IoT-connected sensors to gather insights about how residents use the environment and access services. This data helps inform decision-makers so resources can be more appropriately allocated. The Australian Signals Directorate (ASD) has expressed concerns that align with these warnings of the Five Eyes security alliance, which has warned that the interconnected nature of a fully connected city makes it vulnerable to cyber attacks. 

While Smart Cities offer benefits such as increased efficiency and data-driven decision-making, the downside is that they may expose national and economic security, public health and safety, and critical infrastructure operations to potential vulnerabilities. As Smart Cities become more advanced, they must be able to adapt to the changing cyber landscape in order to protect ourselves from emerging threats. “The intrinsic value of the large data sets and potential vulnerabilities in digital systems means there is a risk of exploitation for espionage and for financial or political gain by malicious threat actors, including nation-states, cybercriminals, hacktivists, insider threats, and terrorists.. ” CISA says.

The risks associated with smart cities are not new. In 2020, the US National Security Agency (NSA) warned that 5G technology used in smart cities could create new attack vectors for hackers, including the potential to disrupt critical infrastructure.

The UK’s National Cyber Security Centre (NCSC) has also highlighted the risks of smart city technology, including the potential for attacks on autonomous vehicles and the use of data to target individuals. 

To address these risks, the CISA guidelines recommend that smart cities adopt a risk management approach that includes identifying potential vulnerabilities and implementing appropriate security measures.

Verizon:    CISA:   I-HLS:     CircloidCircleID:   Independent  Australia:    GovTech:    Palo Alto Networks:   The Mandarin

You Might Also Read: 

Smart Cities Will Soon Be Under Attack:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« British Banks Warn Of A Spike In Online Scams
Mobile Phone Chip Company Collects User’s Private Data »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Security Onion Solutions

Security Onion Solutions

Security Onion Solutions is the creator and maintainer of Security Onion, a free and open platform for threat hunting, network security monitoring, and log management.

VNT Software

VNT Software

VNT's vision is to change the way complex IT problems are resolved by predicting business disruptions before they occur.

ShieldIOT

ShieldIOT

ShieldIOT delivers a complete AI-powered security solution across any IoT device, application and network.

SpyCloud

SpyCloud

SpyCloud is a leader in account takeover (ATO) prevention, protecting billions of consumer and employee accounts either directly or through product integrations.

Highland Capital Partners

Highland Capital Partners

Highland Capital Partners is an early stage venture capital firm focused on category-defining businesses in consumer and enterprise technology, including cybersecurity.

Rocheston

Rocheston

Rocheston is an innovation company with cutting-edge research and development in emerging technologies such as Cybersecurity, Internet of Things, Big Data and automation.

IQ4 - Cybersecurity Workforce Alliance (CWA)

IQ4 - Cybersecurity Workforce Alliance (CWA)

Cybersecurity Workforce Alliance, a division of iQ4, is an organization comprised of a diverse range of professionals dedicated to the development of the cybersecurity workforce.

1Kosmos

1Kosmos

1Kosmos provide Digital Identity and Passwordless Authentication for workforce and customers. Powered by advanced biometrics and blockchain technology.

ImmuniWeb

ImmuniWeb

We Simplify, Accelerate and Reduce Costs of Security Testing, Protection and Compliance.

Cyberfort Group

Cyberfort Group

Cyberfort exists to provide our clients with the peace-of-mind about the security of their data and the compliance of their business.

NASK SA

NASK SA

NASK SA is an integrator of telecommunications services. We provide advanced ICT security services, collocation and hosting, data centre services, and build corporate networks.

Kaesim Cybersecurity

Kaesim Cybersecurity

Kaesim are a global team of cybersecurity experts protecting businesses since 2015. We stop bad people damaging your business, your data and your reputation.

Blattner Technologies

Blattner Technologies

Blattner Technologies mission is to be the leading provider of predictive transformation services and tools in the Data Analytics, Artificial Intelligence and Machine Learning industry.

Project Cypher

Project Cypher

Project Cypher leverages the latest cybersecurity developments, a world class team of hackers and constant R&D to provide you with unparalleled cybersecurity offerings.

Anzen Technology Systems

Anzen Technology Systems

Anzen create software solutions which allows organisations to utilize the public cloud for sensitive or classified information, whilst increasing data security and retaining data sovereignty.

Emantra

Emantra

Emantra specialises in the enablement of Secure Cloud services through it’s comprehensive Sovereign Cloud Hosting, Secure Access Service Edge, and managed services.

Quantum Dice

Quantum Dice

Quantum Dice is an award-winning venture-backed spinout from Oxford University’s world-renowned quantum optics laboratory.

LEPHISH

LEPHISH

LePhish is a French cybersecurity solution specializing in automated phishing campaigns.