5G Renders Smart Cities More Vulnerable To Attacks

Smart cities could transform urban living for the better and from a technological perspective, smart cities can be termed synonymous with digital cities, intelligent cities, wired cities, hybrid cities or information cities. 

The ubiquitous connectivity made possible with 5G and IoT will be the primary driver of the first “true” smart cities of the future.  However, in order to mitigate the risks of cyber threats that can be exacerbated by inadequately secured and Mobile Edge Computing (MEC) technologies, government officials should be aware of smart cities security concerns associated with their supporting infrastructure. 

Now, the Five Eyes security alliance is warning of the security risks posed by the widespread use of 5G technology in Smart Cities and the US Cybersecurity & Infrastructure Security Agency (CISA) has led the way in formulating a new set of guidelines warning about the security risks posed by the use of 5G technology in Smart Cities.

A smart city uses technologies and networking to help improve local services and infrastructure management. For example, a smart city can harness the power of the Internet of Things (IoT), MEC and faster networking, such as 4G LTE and 5G, to reduce operational costs and provide better, faster services and information-sharing.

Typically, a smart city collects data using a web of IoT-connected sensors to gather insights about how residents use the environment and access services. This data helps inform decision-makers so resources can be more appropriately allocated. The Australian Signals Directorate (ASD) has expressed concerns that align with these warnings of the Five Eyes security alliance, which has warned that the interconnected nature of a fully connected city makes it vulnerable to cyber attacks. 

While Smart Cities offer benefits such as increased efficiency and data-driven decision-making, the downside is that they may expose national and economic security, public health and safety, and critical infrastructure operations to potential vulnerabilities. As Smart Cities become more advanced, they must be able to adapt to the changing cyber landscape in order to protect ourselves from emerging threats. “The intrinsic value of the large data sets and potential vulnerabilities in digital systems means there is a risk of exploitation for espionage and for financial or political gain by malicious threat actors, including nation-states, cybercriminals, hacktivists, insider threats, and terrorists.. ” CISA says.

The risks associated with smart cities are not new. In 2020, the US National Security Agency (NSA) warned that 5G technology used in smart cities could create new attack vectors for hackers, including the potential to disrupt critical infrastructure.

The UK’s National Cyber Security Centre (NCSC) has also highlighted the risks of smart city technology, including the potential for attacks on autonomous vehicles and the use of data to target individuals. 

To address these risks, the CISA guidelines recommend that smart cities adopt a risk management approach that includes identifying potential vulnerabilities and implementing appropriate security measures.

Verizon:    CISA:   I-HLS:     CircloidCircleID:   Independent  Australia:    GovTech:    Palo Alto Networks:   The Mandarin

You Might Also Read: 

Smart Cities Will Soon Be Under Attack:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« British Banks Warn Of A Spike In Online Scams
Mobile Phone Chip Company Collects User’s Private Data »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

TEISS

TEISS

Teiss.co.uk is a website dedicated to providing information about cyber security. TEISS also provide a series of conferences and events focused on cyber security.

Yelbridges

Yelbridges

Yelbridges offer high quality IT security & risk management services to mitigate business risks.

DeuZert

DeuZert

DeuZert is an accredited German certification body in accordance with ISO/IEC 27001 (Information Security Management).

Tech Nation

Tech Nation

Tech Nation is the UK’s first national scaleup programme for the cyber security sector, aimed at ambitious tech companies ready for growth, at home and abroad.

Duality Technologies

Duality Technologies

Duality Technologies combine Advanced Cryptography with Data Science to deliver High-Performance Privacy-Protecting Computing to Regulated Industries.

ISARR

ISARR

The ISARR software platform - your bespoke Risk, Resilience & Security Management solution. Simple, cost effective and adaptable, now and into the future.

DAtAnchor

DAtAnchor

Anchor is simply a better way to protect and control sensitive data. Zero-trust, data-centric security. Simplified.

Appsec Phoenix

Appsec Phoenix

Appsec Phoenix is an end to end vulnerability management platform that focuses on workflows, threat feed, and real time data.

Sencode Cyber Security

Sencode Cyber Security

Sencode provides a range of IT security solutions and services, including penetration testing and cyber awareness training to help mitigate the growing risks to your corporate infrastructure.

Cyber Security Partners (CSP)

Cyber Security Partners (CSP)

Cyber Security Partners specialise in the provision of Cyber Security Consultancy, Data Protection and Certification and Compliance services.

SecurityGen

SecurityGen

SecurityGen is a global cybersecurity start-up focused on telecom security, with a focus on 5G networks.

Riskonnect

Riskonnect

Riskonnect technology empowers organizations with the ability to anticipate, manage, and respond in real-time to strategic, operational, and digital risks across the extended enterprise.

Catalogic Software

Catalogic Software

Catalogic helps clients backup, recover, manage, and protect their data across their enterprise and cloud environments with Smart Data Protection solutions.

UltraViolet Cyber

UltraViolet Cyber

UltraViolet is an industry leading tech-enabled managed security services company.

Aprio

Aprio

Aprio is a premier business advisory and accounting firm. We deliver advisory, tax, managed, and private client services to build value, drive growth, manage risk, and protect wealth.

Calculus Networks

Calculus Networks

Calculus deliver cutting-edge technology solutions and services in cybersecurity and agile innovation, helping organizations thrive in a fast-evolving digital landscape.