Smart Cities Will Soon Be Under Attack

Cyberattacks, criminal hacking groups and data breaches are not going away and there is a constant stream of high profile data breaches, ranging from the theft of medical information, account credentials, corporate emails, and internal sensitive enterprise data.

Increasingly, many analysts are predicting a new trend that identifies smart cities as being at risk and in need of particularly serious focus. In smart cities, the scope for disruption is immense.

  • Hackers could take over the AIs that control critical infrastructure, putting water or electricity supplies in the hands of malicious actors. 
  • Connected cars might make a daily commute easier, although virtually all of our the nessecary data to operate them will reside in cloud computing datasets stored in data dumps strewn all over the Internet, where the dataflow and access to information is potentially vulnerable.

That convenience of a high level of urban interconnectivity  comes at a cost, says Mariarosaria Taddeo, who is a Senior Research Associate at the University of Oxford's Internet Institute. Artificial intelligence is a key part of cyber security’s future development, according to Ms Taddeo who says  “My speculative idea is that the more you have smart cities, the wider the surface of attack.”

Other experts take hope from the evolution of older software like Adobe Flash. Previously hackers have relied on a single flaw, says Ryan Kalember, head of cyber security strategy at Proofpoint, a leading technology protection company. “With a bug in 2010, I could do something really effective because the system was not designed in a resilient way.”

Mr Kalember is  optimimistic for improved security methods: smartphones, for example, already use biometric authentication such as fingerprint or facial recognition instead of passwords. “As you have things like face identification it becomes increasingly absurd that we have dozens, of passwords managed in deeply insecure ways,” he says. This shift is essential, he adds, because although technical vulnerabilities will be harder to exploit in future, humans are already the weakest link in cyber security, with the most tech-savvy individuals vulnerable to increasingly personalised and complex attacks.

The rise of deep fakes, synthetic audio, video and photos of people generated by algorithms, is one source of vulnerabilities. “Deep fakes are becoming increasingly common, increasingly accessible and increasingly realistic,” warns Henry Ajder, head of communications and research analysis at DeepTrace Labs, a start-up that identifies deep fakes.

Hackers can depict someone saying or doing almost anything using ever-decreasing amounts of initial material. So far, the technology has mainly been used to create so-called revenge pornography. But the risk of other criminal uses of deep fakes is growing as the tech improves.

But cyber security should not come at the cost of privacy, warns Ms Taddeo. She points to state of the art systems that can “monitor all of your movements while you’re connected, any keystroke, movement on the trackpad, where your eyes are moving”.  

Between pervasive data collection and constant authentication, she says, the risk is that we create a panopticon, where surveillance systems are expanded out of all proportion.

There are three key pieces of technology that are likely to drive the development of Smart City  secuirty in the coming decade:

Machine Learning And AI
Artificial Intelligence is already being deployed in a wide range of situations and it is likely that hackers are already incorporating AI into their attack methods.

The Cloud
Cloud storage represents both a risk and an asset when it comes to cyber security. On one hand, distributed storage can make critical information easier to steal, because an attacker only needs to identify one weak machine in order to compromise a system. On the other hand, with the correct encryption, cloud storage can actually be more secure than physical drives.

Blockchain
Blockchain has the potentail to revolutionise cyber security in the coming years. By providing a secure way to share key information between multiple users, it promises to protect data from the most common types of cyberattack. On the other hand, it might not be long before even blockchain is compromised.

TechTimes:       PhilPapers:   FT.com:      News Statesman:      ZDNet

You Might Also Read:

Securing Smart Cities Using AI:
 

 

« Mandatory IoT Security In Britain
Amazon Prime Scam Cost Victims £1m »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Delphix

Delphix

Delphix is the industry leader for DevOps test data management.

Mixed Mode

Mixed Mode

Mixed Mode is a specialist in embedded and software engineering for applications including IoT and secure embedded systems.

Red Balloon Security (RBS)

Red Balloon Security (RBS)

Red Balloon Security is a leading embedded device security company, delivering deep host-based defense for all devices.

SecuGen

SecuGen

SecuGen is a leading provider of advanced, optical fingerprint recognition technology, products, tools and platforms for physical and information security.

Segusoft

Segusoft

With its encryption platform SEGULINK, Segusoft provides standard software for companies to securely transfer files and messages.

Temasoft

Temasoft

TEMASOFT is a software company focused on developing security and infrastructure products.

CyberClan

CyberClan

CyberClan’s carefully selected team of experts is capable of solving complex cyber security challenges – keeping your data secure and your businesses running as usual.

Key Cyber Solutions

Key Cyber Solutions

Key Cyber is an IT consulting firm that specializes in agile software development services, program management and infrastructure services, cyber security and cloud and managed services.

Resilience Cyber Insurance Solutions

Resilience Cyber Insurance Solutions

Resilience Cyber Insurance combines insurance expertise with cybersecurity and data talent to deliver clear, effective solutions to protect you for the cyberrisks of today—and tomorrow.

AwareGO

AwareGO

AwareGO is a global provider of security awareness training content and solutions that help enterprises improve cybersecurity awareness in the workplace.

FortifyIQ

FortifyIQ

FortifyIQ's mission is to advance maximum security against side-channel attacks across the entire computing spectrum.

ESC - Enterprise Security Center

ESC - Enterprise Security Center

ESC is a system house specializing exclusively in IT security - Security Implementation & Optimization, Operations, Managed Security Services.

iVision

iVision

iVision is a technology integration and management firm that engineers success for clients through objective recommendations, process and technology expertise and best-of-breed guidance.

Crayon

Crayon

Crayon is a customer-centric innovation and IT services company. We provide guidance on the best solutions for our clients’ business needs and budget with software, cloud, AI and big data.

VP Techno Labs

VP Techno Labs

VP Techno Labs is an award-winning cybersecurity firm focusing only cybersecurity to develop cutting edge solutions for emerging business.

Framework Security

Framework Security

With Framework Security, you get more than a consultancy; you get a partner dedicated to simplifying cybersecurity and protecting your business in the most efficient way possible.

Evolver

Evolver

Evolver delivers technology services and solutions that improve security, promote innovation, and maximize operational efficiency in support of government and commercial customers.