Thursday, February 27, 2025
Homecyber securitySecurity for Smart Cities

Security for Smart Cities

Published on

SIEM as a Service

Follow Us on Google News

Japan is a world-leader when it comes to the real-world deployment of smart technologies. Through sophisticated networks of sensors, entire cities can be redesigned to meet the needs of the people living there. Networks of this sort are more commonly referred to as Internet-of-Things connected; settlements where this practice is widespread are known as Smart Cities. If the current direction of travel is maintained, then this will be the rule rather than the exception, not only in Japan, but everywhere in the world.

Keeping a city of this sort secure would mean installing CCTV cameras throughout, connecting them up, and powering them (using modern switch-mode power supplies). Of course, there are civil liberties concerns to address before this becomes practicable, not least of which is the possibility that this network might actually be compromised.

Security Costs

Of course, with all of this connectivity comes a not-insignificant security problem. What if hackers were to gain access to the network, and access the data stored there? Interconnected devices aren’t always protected to the same degree. Once a vulnerable device is exposed, then an attacker might move laterally through an entire system, gobbling up data as they go. This practice was demonstrated a few years ago when an American casino was attacked via the internet-connected fish tank in its lobby.

When it’s an entire city that’s connected in this way, rather than just a single business, the amount of data on offer is greater by an order of magnitude. And so too, therefore are the risks.

Meeting the Challenge

So how is this challenge to be met? There are several methods, which will need to be deployed in tandem to be truly effective.

Compartmentalisation

Just as an ocean liner might be divided into several large compartments to prevent the entire thing from being flooded by a single impact, so might a network of IoT devices be compartmentalised. End-points can be isolated, limiting the opportunity for viruses to spread.

Multi-factor Authentication

Biometrics might come in alongside passwords and location data to ensure that devices are made truly resilient against attack. While a password might be stolen or guessed, a fingerprint is less vulnerable. Multi-factor authentication has rapidly become the norm for individuals; for cities, it might well be mandatory.

Frequent Updates

In a network the size of a city, of course, it would be impracticable for every device to rely on manual updates. Automated updates will ensure that leaks are contained swiftly. Building in this function would allow each device to keep track of its own health, and to obtain updates from trusted sources.

Latest articles

VS Code Extension with 9 Million Installs Attacks Developers with Malicious Code

Microsoft has removed two widely-used Visual Studio Code (VS Code) extensions, “Material Theme Free”...

New Anubis Ransomware Targets Windows, Linux, NAS, and ESXi x64/x32 Environments

A new ransomware group, dubbed Anubis, has emerged as a significant threat in the...

WordPress Admins Warned of Fake Plugins Injecting Malicious Links into Websites

A new wave of cyberattacks targeting WordPress websites has been uncovered, with attackers leveraging...

LARVA-208 Hackers Compromise 618 Organizations Stealing Logins and Deploying Ransomware

A newly identified cybercriminal group, LARVA-208, also known as EncryptHub, has successfully infiltrated 618...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

VS Code Extension with 9 Million Installs Attacks Developers with Malicious Code

Microsoft has removed two widely-used Visual Studio Code (VS Code) extensions, “Material Theme Free”...

New Anubis Ransomware Targets Windows, Linux, NAS, and ESXi x64/x32 Environments

A new ransomware group, dubbed Anubis, has emerged as a significant threat in the...

WordPress Admins Warned of Fake Plugins Injecting Malicious Links into Websites

A new wave of cyberattacks targeting WordPress websites has been uncovered, with attackers leveraging...