This article is available also in spanish here
These are the cyber threats that jeopardise the security of smart cities
My list

Author | Patricia LicerasToday, it is practically impossible to imagine life without the internet. Work, vehicles, homes and even entire cities are becoming smarter thanks to the interconnectivity that brings them together through the Internet of Things. According to figures from the Hootsuite and We Are Social Digital In 2018 study, there are around 8,485 million devices connected to the internet. There are more devices online that people on Earth and this figure will grow exponentially in the coming years.However, these advances are not beneficial for society. They can also pose a developing threat to cybersecurity, according to Check Point Software Technologies. This international firm specialising in cybersecurity identified the main threats in smart cities:

  • Controlling traffic lights. Many cities have central control stations that manage the traffic lights and traffic. These control stations allow streets with traffic jams to be cleared or enable routes for special services such as ambulances, by changing all the traffic lights to green, thus clearing any obstacles in the way. But “on the other hand, if cybercriminals were to get hold of this system, they would be able to manage all the city’s traffic lights, changing them all to green, causing countless accidents”, according to the company.
smart city cyber attack
  • Attacks against smart vehicles. The first autonomous vehicles are gradually making an appearance, equipped with numerous sensors that enable speed and brakes to be controlled and to calculate distances from surrounding elements, among other features. As in the previous case, cyber criminals could take control of one or more of these vehicles and cause collisions.
  • Collapsing the power grid According to Check Point, although it is not yet a visible threat, since in Europe self-management of electricity is households is not commonplace yet, the possibility of collapsing the power grid would be a medium-term risk. “Hackers could take control of plants’ power management systems and falsify demand data or even cause a power outage in an entire city”, the company claims. This is not just an imaginary scenario, since countries like Ukraine have already experienced serious disruptions to their power grid, which has been extremely difficult to alleviate given the poor condition of its infrastructure.
  • Water supply. Smart cities have systems in place to control the flow of water and to establish whether there are any leaks, etc. Therefore, “one of the main risks would be an interruption to the water supply or increased pressure to damage this circuit” says the company. However, the greatest threat would be “access by cyber criminals to the water processing centre, where they could modify the levels of chemical additives in the water and cause public health problems”.
  • Surveillance cameras. Lastly, this firm considers security cameras to be an “easy target for hackers, since they can use them to spy on people or the movements of objects and therefore access personal data and images”.

nuclear plant hacking

Apart from the cases outlined above, there are others that are already a reality and which, therefore, cannot be classified as future threats. The clearest example of this is ransomware, viruses designed to kidnap individual or network computer systems and which only disappear after paying a ransom.Ransomware is a real and existing threat. At the end of 2016, the San Francisco transit service was partially knocked out after the Municipal Transport Agency was attacked by hackers, who locked up computers and data, demanding a ransom of 73,000 dollars, and more recently the WannaCry cyberattack affected countless computer systems across the world, affecting both private companies and the British health system, which lost control of the computers in various hospitals.Although security measures prevented even further damage, these disruptions can be extremely costly.

It is time to look at information systems security as a fundamental part of the administration.

There is no doubt that technology improves and facilitates our lives, but the more developed and advanced it becomes, the more points that will need to be protected. This is why planning smart cities cannot be carried out without collaborating closely with the technical teams in charge of safeguarding security in these cities.In this regard, according to Eusebio Nieva, technical director at Check Point for Spain and Portugal, “very often focus is placed solely on the investment and on the measures required to carry out that innovation, forgetting about the security measures required to be protected from increasingly powerful threats”.Images | Unsplash, Pixabay

Related content
Post-pandemic cities spark safety concerns for three-quarters of Brits
Post-pandemic cities spark safety concerns for three-quarters of Brits
Home working increases cyber-security fears
Home working increases cyber-security fears
Microsoft: Smart Places and Infrastructure with IoT, AI, and Digital Twins
Microsoft: Smart Places and Infrastructure with IoT, AI, and Digital Twins
What technology is used to prevent and punish crime? - Infographic
What technology is used to prevent and punish crime? - Infographic
Vienna will install smart traffic lights that will recognise when pedestrians want to cross the street
Vienna will install smart traffic lights that will recognise when pedestrians want to cross the street
The future of cities lies in data
The future of cities lies in data
Usama Bilal: “It is important for cities to act as health prevention agents”
Usama Bilal: “It is important for cities to act as health prevention agents”
Fire protection technology: Home automation systems in New Orleans
Fire protection technology: Home automation systems in New Orleans
The justice administration in smart cities: between streamlining and automation
The justice administration in smart cities: between streamlining and automation
Social score system: A tool to oppress or reward citizens?
Social score system: A tool to oppress or reward citizens?
Should we be looking to the stars or at cities? Practical approaches to the phenomenon of overpopulation
Should we be looking to the stars or at cities? Practical approaches to the phenomenon of overpopulation
These are the cyber threats that jeopardise the security of smart cities
These are the cyber threats that jeopardise the security of smart cities
How does technology enables San Francisco to become a safe city for citizens?
How does technology enables San Francisco to become a safe city for citizens?
And then what? Cities after COVID-19
And then what? Cities after COVID-19
Arca: Wave control for better health
Arca: Wave control for better health
Xpernest: Handy tools to ensure a successful social distancing
Xpernest: Handy tools to ensure a successful social distancing
Microsoft: A strong commitment to a planet-size challenge
Microsoft: A strong commitment to a planet-size challenge
Urban overcrowding and rural depopulation: Are there any solutions to these problems?
Urban overcrowding and rural depopulation: Are there any solutions to these problems?
Technology in smart cities: from chips to people
Technology in smart cities: from chips to people
The Sails of Scampia: when inclusive architecture turns against people
The Sails of Scampia: when inclusive architecture turns against people
Black boxes in cars: safety or the beginning of the end of privacy in vehicles?
Black boxes in cars: safety or the beginning of the end of privacy in vehicles?
The algorithm that clears the way for emergency vehicles
The algorithm that clears the way for emergency vehicles
How cities are protecting elderly people from COVID-19
How cities are protecting elderly people from COVID-19
The next step in urban evolution: hyperconnected cities are on the way
The next step in urban evolution: hyperconnected cities are on the way
This is how emergency systems work in a smart city
This is how emergency systems work in a smart city
Neareo: Powering QR codes
Neareo: Powering QR codes
Facial recognition and combating crime: why biases can lead to a justice system full of prejudices
Facial recognition and combating crime: why biases can lead to a justice system full of prejudices
Proxyclick: Getting ready for the future of work
Proxyclick: Getting ready for the future of work
IEE: People Counter
IEE: People Counter
Ai.just: AI to keep COVID-19 in check at work
Ai.just: AI to keep COVID-19 in check at work
Go Zero Waste: A guide to zero waste living
Go Zero Waste: A guide to zero waste living
Recommended profiles for you
Remember to activate your profile to network!
Activate profile
BA
BENASSOU AMINE
Ingram Micro Noth Africa
developing and handling Physical security business
LK
Lucky Khanna
PIET
Student and Department Representor
VN
Vishal Nandakumar
StartUp
VP/Founder
Tiffany Edwards
Tiffany Edwards
Industrious Content
Content creator and publisher, including social media growth and engagement
Rafael Ravelo
Rafael Ravelo
Aiecin
Owner
DS
DEEPTHI SUBASH
G4S
SENIOR PRESALES ENGINEER
MN
Mohamed Nabil
Computer and Communication Concept Triple C
Project Manager
david Garcia
david Garcia
Dagram
Account Manager
Sergio Escobar
Sergio Escobar
Center for International Strategic Studies MG
Executive Director/Center for Strategic International Studies
Pascal AGOSTINI
Pascal AGOSTINI
ENGIE Solutions
Project Manager
Mdkaushal Siddiqui
Mdkaushal Siddiqui
Smart 🏠 home
1
JL
JOSE LUIS LUNA
uaim
developer
Diego Vega
Diego Vega
ITELCA
Marketing Manger
RP
Robert Pinkas
VisionCraft, s.r.o.
Partner, Founder, COO
Pere Martínez
Pere Martínez
ITechGrup
CEO
DY
Daniel Yepes
Olimpia it
Manager
Eudosio Sifuentes León
Eudosio Sifuentes León
Universidad Nacional Mayor de San Marcos
Docente
MS
Moulaye Sidina
Kinross gold tasiast
Senior supervisor
JP
Jorge Pola
DEINTA SEGURIDAD
Marketing Director
JP
Jon Polly
ProTecht Solutions Partners
I am the owner of a small security consulting firm focused smart city camera applications.

Only accessible for registered users
This content is available only for registered users
TO: $$toName$$
SUBJECT: Message from $$fromName$$