5G Renders Smart Cities More Vulnerable To Attacks

Smart cities could transform urban living for the better and from a technological perspective, smart cities can be termed synonymous with digital cities, intelligent cities, wired cities, hybrid cities or information cities. 

The ubiquitous connectivity made possible with 5G and IoT will be the primary driver of the first “true” smart cities of the future.  However, in order to mitigate the risks of cyber threats that can be exacerbated by inadequately secured and Mobile Edge Computing (MEC) technologies, government officials should be aware of smart cities security concerns associated with their supporting infrastructure. 

Now, the Five Eyes security alliance is warning of the security risks posed by the widespread use of 5G technology in Smart Cities and the US Cybersecurity & Infrastructure Security Agency (CISA) has led the way in formulating a new set of guidelines warning about the security risks posed by the use of 5G technology in Smart Cities.

A smart city uses technologies and networking to help improve local services and infrastructure management. For example, a smart city can harness the power of the Internet of Things (IoT), MEC and faster networking, such as 4G LTE and 5G, to reduce operational costs and provide better, faster services and information-sharing.

Typically, a smart city collects data using a web of IoT-connected sensors to gather insights about how residents use the environment and access services. This data helps inform decision-makers so resources can be more appropriately allocated. The Australian Signals Directorate (ASD) has expressed concerns that align with these warnings of the Five Eyes security alliance, which has warned that the interconnected nature of a fully connected city makes it vulnerable to cyber attacks. 

While Smart Cities offer benefits such as increased efficiency and data-driven decision-making, the downside is that they may expose national and economic security, public health and safety, and critical infrastructure operations to potential vulnerabilities. As Smart Cities become more advanced, they must be able to adapt to the changing cyber landscape in order to protect ourselves from emerging threats. “The intrinsic value of the large data sets and potential vulnerabilities in digital systems means there is a risk of exploitation for espionage and for financial or political gain by malicious threat actors, including nation-states, cybercriminals, hacktivists, insider threats, and terrorists.. ” CISA says.

The risks associated with smart cities are not new. In 2020, the US National Security Agency (NSA) warned that 5G technology used in smart cities could create new attack vectors for hackers, including the potential to disrupt critical infrastructure.

The UK’s National Cyber Security Centre (NCSC) has also highlighted the risks of smart city technology, including the potential for attacks on autonomous vehicles and the use of data to target individuals. 

To address these risks, the CISA guidelines recommend that smart cities adopt a risk management approach that includes identifying potential vulnerabilities and implementing appropriate security measures.

Verizon:    CISA:   I-HLS:     CircloidCircleID:   Independent  Australia:    GovTech:    Palo Alto Networks:   The Mandarin

You Might Also Read: 

Smart Cities Will Soon Be Under Attack:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« British Banks Warn Of A Spike In Online Scams
Mobile Phone Chip Company Collects User’s Private Data »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Acuity Risk Management

Acuity Risk Management

Acuity Risk Management helps businesses worldwide effectively manage, prioritize and report on their risks to inform strategic and tactical decision-making and build long-term resilience.

Cryptsoft

Cryptsoft

Cryptsoft provides key management and security software development toolkits based around open standards such as OASIS KMIP and PKCS#11.

Sanderson Recruitment

Sanderson Recruitment

Sanderson is a recruitment company providing expert recruitment services in areas including Cyber & Information Security.

Finnish Accreditation Service (FINAS)

Finnish Accreditation Service (FINAS)

FINAS is the national accreditation body for Finland. The directory of members provides details of organisations offering certification services for ISO 27001.

Lithuanian National Accreditation Bureau

Lithuanian National Accreditation Bureau

Lithuanian National Accreditation Bureau is the national accreditation body for Lithuania. The directory of members provides details of organisations offering certification services for ISO 27001.

North American International Cyber Summit

North American International Cyber Summit

The North American International Cyber Summit brings together experts from around the globe to provide timely content and address a variety of cybersecurity issues impacting the world.

Britive

Britive

The Britive Platform is a cloud-native security solution built for the most demanding cloud-forward enterprises.

CleanCloud by SEK

CleanCloud by SEK

CleanCloud by SEK is a CSPM product focused on public cloud data protection and security regulations, with over 400 compliance checks for the market's leading frameworks and regulations.

Drip7

Drip7

Drip7 is a micro-learning platform that is re-inventing the way companies train their employees and build lasting cultural change around the importance of cybersecurity.

Elisity

Elisity

Elisity Cognitive Trust is a new security paradigm that combines Zero Trust Network Access and an AI-enabled Software Defined Perimeter.

Celera Networks

Celera Networks

Celera Networks is a managed services provider specializing in cybersecurity, cloud and managed IT services.

Mitigo Group

Mitigo Group

Mitigo offers a well considered and effective approach to keeping businesses completely secure from any digital attacks.

DerSecur

DerSecur

DerSecur has been engaged in advanced technology activities in the field of Application Security since 2011. We offer R&D technology solutions in the field of SAST, DAST and SCA analysis.

Excite Cyber

Excite Cyber

Excite Technology Services (formerly Cipherpoint) is focused on improving the security posture of our customers.

Cork

Cork

Cork is a purpose-built cyber warranty company for managed service providers (MSPs) serving small businesses (SMBs) and the software solutions they manage.

Symbiotic Security

Symbiotic Security

Symbiotic Security revolutionizes code security by integrating an AI-driven security coach directly within developers' IDEs.