Smart Cities Will Soon Be Under Attack

Cyberattacks, criminal hacking groups and data breaches are not going away and there is a constant stream of high profile data breaches, ranging from the theft of medical information, account credentials, corporate emails, and internal sensitive enterprise data.

Increasingly, many analysts are predicting a new trend that identifies smart cities as being at risk and in need of particularly serious focus. In smart cities, the scope for disruption is immense.

  • Hackers could take over the AIs that control critical infrastructure, putting water or electricity supplies in the hands of malicious actors. 
  • Connected cars might make a daily commute easier, although virtually all of our the nessecary data to operate them will reside in cloud computing datasets stored in data dumps strewn all over the Internet, where the dataflow and access to information is potentially vulnerable.

That convenience of a high level of urban interconnectivity  comes at a cost, says Mariarosaria Taddeo, who is a Senior Research Associate at the University of Oxford's Internet Institute. Artificial intelligence is a key part of cyber security’s future development, according to Ms Taddeo who says  “My speculative idea is that the more you have smart cities, the wider the surface of attack.”

Other experts take hope from the evolution of older software like Adobe Flash. Previously hackers have relied on a single flaw, says Ryan Kalember, head of cyber security strategy at Proofpoint, a leading technology protection company. “With a bug in 2010, I could do something really effective because the system was not designed in a resilient way.”

Mr Kalember is  optimimistic for improved security methods: smartphones, for example, already use biometric authentication such as fingerprint or facial recognition instead of passwords. “As you have things like face identification it becomes increasingly absurd that we have dozens, of passwords managed in deeply insecure ways,” he says. This shift is essential, he adds, because although technical vulnerabilities will be harder to exploit in future, humans are already the weakest link in cyber security, with the most tech-savvy individuals vulnerable to increasingly personalised and complex attacks.

The rise of deep fakes, synthetic audio, video and photos of people generated by algorithms, is one source of vulnerabilities. “Deep fakes are becoming increasingly common, increasingly accessible and increasingly realistic,” warns Henry Ajder, head of communications and research analysis at DeepTrace Labs, a start-up that identifies deep fakes.

Hackers can depict someone saying or doing almost anything using ever-decreasing amounts of initial material. So far, the technology has mainly been used to create so-called revenge pornography. But the risk of other criminal uses of deep fakes is growing as the tech improves.

But cyber security should not come at the cost of privacy, warns Ms Taddeo. She points to state of the art systems that can “monitor all of your movements while you’re connected, any keystroke, movement on the trackpad, where your eyes are moving”.  

Between pervasive data collection and constant authentication, she says, the risk is that we create a panopticon, where surveillance systems are expanded out of all proportion.

There are three key pieces of technology that are likely to drive the development of Smart City  secuirty in the coming decade:

Machine Learning And AI
Artificial Intelligence is already being deployed in a wide range of situations and it is likely that hackers are already incorporating AI into their attack methods.

The Cloud
Cloud storage represents both a risk and an asset when it comes to cyber security. On one hand, distributed storage can make critical information easier to steal, because an attacker only needs to identify one weak machine in order to compromise a system. On the other hand, with the correct encryption, cloud storage can actually be more secure than physical drives.

Blockchain
Blockchain has the potentail to revolutionise cyber security in the coming years. By providing a secure way to share key information between multiple users, it promises to protect data from the most common types of cyberattack. On the other hand, it might not be long before even blockchain is compromised.

TechTimes:       PhilPapers:   FT.com:      News Statesman:      ZDNet

You Might Also Read:

Securing Smart Cities Using AI:
 

 

« Mandatory IoT Security In Britain
Amazon Prime Scam Cost Victims £1m »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Detectify

Detectify

Detectify is a web security service that simulates automated hacker attacks on your website, detecting critical security issues before real hackers do.

Norwegian Center for Information Security (NorSIS)

Norwegian Center for Information Security (NorSIS)

NorSIS) is an independent organization that works to increase knowledge and understanding of information security for businesses and individuals.

Awen Collective

Awen Collective

Awen Collective develops software-based tools for performing Digital Forensics, Incident Response and Cyber-Crime Investigation.

Information and Communication Technology Authority (ICT Authority) - Kenya

Information and Communication Technology Authority (ICT Authority) - Kenya

The ICT Authority is responsible for enforcing ICT standards in Government and ensuring information security.

BA-CSIRT

BA-CSIRT

BA-CSIRT is a center which is dedicated to assist and raise awareness among citizens and the Government of the City of Buenos Aires in everything related to information security.

Aujus Cybersecurity

Aujus Cybersecurity

Aujas is a pure-play cyber security services company with deep expertise in Identity and Access Management, Managed Security and Security Testing services.

Edureka

Edureka

Edureka is an online technology training provider with the most effective learning system in the world. We help professionals learn trending technologies for career growth.

Norma Inc.

Norma Inc.

Norma provides the secured wireless environment (WiFi and Bluetooth) with the unauthorized AP detection, and secures your IoT assets from various threats.

Neosec

Neosec

We’re reinventing API security. Understanding behavior requires data, analytics, and intelligence. Neosec brings XDR techniques to application security.

SpeQtral

SpeQtral

SpeQtral offers commercial space-based Quantum Key Distribution (QKD) founded on technology developed at the National University of Singapore.

AutoRABIT

AutoRABIT

AutoRABIT provides DevSecOps tools built specifically for Salesforce developers to increase release velocity, produce consistently high-quality code, and enhance data security.

Netox

Netox

Netox is a comprehensive IT service provider that combines IT support services, IT solutions and specialist services; specializing in cybersecurity solutions.

EtherAuthority

EtherAuthority

EtherAuthority's engineering team has been helping blockchain businesses to secure their smart contract based assets since 2018.

Endure Secure

Endure Secure

Endure Secure is a managed cyber security & information security consultancy. Our passion for IS and our understanding of the threat landscape is reflected in the services that we provide.

DruvStar

DruvStar

DruvStar provides B2B cybersecurity around threat management to strengthen businesses across attack vectors.

NeuroID

NeuroID

NeuroID combines the power of industry-leading behavioral analytics with advanced device and network intelligence to create your first line of defense against malicious bots, bad actors, and fraud.