5G Renders Smart Cities More Vulnerable To Attacks

Smart cities could transform urban living for the better and from a technological perspective, smart cities can be termed synonymous with digital cities, intelligent cities, wired cities, hybrid cities or information cities. 

The ubiquitous connectivity made possible with 5G and IoT will be the primary driver of the first “true” smart cities of the future.  However, in order to mitigate the risks of cyber threats that can be exacerbated by inadequately secured and Mobile Edge Computing (MEC) technologies, government officials should be aware of smart cities security concerns associated with their supporting infrastructure. 

Now, the Five Eyes security alliance is warning of the security risks posed by the widespread use of 5G technology in Smart Cities and the US Cybersecurity & Infrastructure Security Agency (CISA) has led the way in formulating a new set of guidelines warning about the security risks posed by the use of 5G technology in Smart Cities.

A smart city uses technologies and networking to help improve local services and infrastructure management. For example, a smart city can harness the power of the Internet of Things (IoT), MEC and faster networking, such as 4G LTE and 5G, to reduce operational costs and provide better, faster services and information-sharing.

Typically, a smart city collects data using a web of IoT-connected sensors to gather insights about how residents use the environment and access services. This data helps inform decision-makers so resources can be more appropriately allocated. The Australian Signals Directorate (ASD) has expressed concerns that align with these warnings of the Five Eyes security alliance, which has warned that the interconnected nature of a fully connected city makes it vulnerable to cyber attacks. 

While Smart Cities offer benefits such as increased efficiency and data-driven decision-making, the downside is that they may expose national and economic security, public health and safety, and critical infrastructure operations to potential vulnerabilities. As Smart Cities become more advanced, they must be able to adapt to the changing cyber landscape in order to protect ourselves from emerging threats. “The intrinsic value of the large data sets and potential vulnerabilities in digital systems means there is a risk of exploitation for espionage and for financial or political gain by malicious threat actors, including nation-states, cybercriminals, hacktivists, insider threats, and terrorists.. ” CISA says.

The risks associated with smart cities are not new. In 2020, the US National Security Agency (NSA) warned that 5G technology used in smart cities could create new attack vectors for hackers, including the potential to disrupt critical infrastructure.

The UK’s National Cyber Security Centre (NCSC) has also highlighted the risks of smart city technology, including the potential for attacks on autonomous vehicles and the use of data to target individuals. 

To address these risks, the CISA guidelines recommend that smart cities adopt a risk management approach that includes identifying potential vulnerabilities and implementing appropriate security measures.

Verizon:    CISA:   I-HLS:     CircloidCircleID:   Independent  Australia:    GovTech:    Palo Alto Networks:   The Mandarin

You Might Also Read: 

Smart Cities Will Soon Be Under Attack:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« British Banks Warn Of A Spike In Online Scams
Mobile Phone Chip Company Collects User’s Private Data »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Malwarebytes

Malwarebytes

Malwarebytes provides artificial intelligence-powered technology that stops cyberattacks before they can compromise computers and endpoints.

GFI Software

GFI Software

GFI Software works with System Administrators, IT Professionals and IT Executives to ensure that their IT infrastructures are monitored, managed, secured and compliant.

Vade Secure

Vade Secure

Vade Secure provides protection against the most sophisticated email scams such as phishing and spear phishing, malware and ransomware.

National Association of State Chief Information Officers (NASCIO)

National Association of State Chief Information Officers (NASCIO)

NASCIO's Cybersecurity Committee focuses helps state CIOs to formulate high-level security and data protection policies and technical controls.

Kudelski Security

Kudelski Security

Kudelski Security is an international cybersecurity company providing innovative, independent and tailored security solutions for large enterprise and public sector clients.

Ideagen

Ideagen

Ideagen provides information management, safety, risk and compliance software solutions that allow organisations to achieve operational excellence, regulatory compliance and reduce risk.

Nubo Software

Nubo Software

Nubo’s Virtual Mobile Infrastructure creates a virtual corporate device on your employee smartphones and tablets. Enable unlimited mobility without leaving any data at risk.

Sasa Software

Sasa Software

Sasa Software is a cybersecurity software developer specializing in the prevention of file-based network attacks.

GeoLang

GeoLang

GeoLang’s Ascema platform protects sensitive information at the content level by identifying, classifying and tracking data across the corporate infrastructure.

BigWeb Technologies

BigWeb Technologies

BigWeb Technologies is dedicated to provide its clients with ICT related services including Infrastructure Solutions, Consultancy and Security.

DeuZert

DeuZert

DeuZert is an accredited German certification body in accordance with ISO/IEC 27001 (Information Security Management).

Eaton

Eaton

Eaton provides comprehensive cybersecurity services for operational technology (OT) to help keep your operations and personnel safe.

DKBInnovative

DKBInnovative

DKBinnovative is a best-practice driven IT management firm that provides secure, reliable IT solutions to productivity-focused clients around the globe.

CY4GATE

CY4GATE

CY4GATE was conceived to design, develop and produce technologies and products that are able to meet the most stringent and modern requirements of Cyber Intelligence & Cyber Security.

SecurityGen

SecurityGen

SecurityGen is a global cybersecurity start-up focused on telecom security, with a focus on 5G networks.

Tech Vedika

Tech Vedika

Tech Vedika has access to technical guidance, training and resources from AWS to successfully undertake solution architecture, application development, application migration, and managed services.