A recent article from IOT World highlights that real world events can trigger cyber attacks either as protest or retaliation. City Security: How Fort Lauderdale Deals with Cyber Threats The article describes: In 2014, the city of Ferguson, Mo. was hit with a cyberattack in apparent retaliation for the police shooting of the unarmed teen … Continue reading Lessons to be learned from recent attacks to cities
Month: August 2019
It is important to be aware of and take note from Ashby's Law of Requisite Variety when addressing the problem of cyber security for a smart city. If a system is to be stable, the number of states of its control mechanism must be greater than or equal to the number of states in the … Continue reading Smart Cities, cyber security and cybernetics
Two events this year show what can happen with home security cameras. 1. An Illinois couple said a hacker spoke to their baby through one of their Nest security cameras and then later hurled obscenities at them, CBS station WBBM-TV reports. Arjun Sud told the station he was outside his 7-month-old son's room Sunday outside … Continue reading City and home smart cameras, eavesdropping, surveillance and safety
A recently published report from ABI Research highlights that the lack of investment into Smart City Cyber Security will have some serious consequences. Report from ABI ResearchPress release coverage of the report at Smart Cities World To quote from ABI Research summary: On top of strategic recommendations, this report offers three distinct smart city cybersecurity … Continue reading Smart City lack of investment in cybersecurity
Whilst the structure and services of global cities are very similar there are very different ways in which cities are governed and administrated. This post will consider three different countries and cities: London, UKParis, FranceNew York, USA The way in which cities are governed and administered will create some interesting cyber security challenges as each … Continue reading Management of Cities
As Smart Cities develop, the relationship between the Home, Communities and the City as a whole will become ever more integrated and connected. Each of these can be viewed independently, paired or all together when considering the specific threat environment and landscape. By threat environment and landscape i mean the broader make up of the … Continue reading Connected Homes, Communities and Cities Threat Environment
A review of the reported incidents on Hackmageddon shows that there are a variety of City / Public Services attacks emerging. TargetOverviewAttack Types / VectorSunderland City CouncilHackers access users’ personal details in a cyber attack on Sunderland City Council’s library database.Data Breech, Compromise, AccessLouisville Regional Airport Authority (LRAA)Is hit by a ransomware attack.Phishing, Initial Access.Broome … Continue reading Recent cyber attacks on Cities
A sign outside Google’s headquarters in Mountain View last year attests to the need for affordable housing.Photo: James Tensuan / Special to The Chronicle 2018 Approving and constructing new Bay Area housing can take years.Photo: Amy Osborne / Special to The Chronicle Google has committed to a $1 billion plan that would help build 20,000 … Continue reading The House that Google built
Whilst technically a City is not deemed Critical National Infrastructure there are or soon will be good reasons to consider capitals and major cities as something critical to the safety, welfare and economy of a country. Consider the UK government’s official definition of CNI: ‘Those critical elements of infrastructure (namely assets, facilities, systems, networks or … Continue reading Cities, critical infrastructure and maturity
In the first wave of Smart City developments, with proposed projects like Waterfront Toronto and Bleutech Park Las Vegas, these will be designated zones within existing cities. Whilst the Waterfront project has seen some controversy and objections from Toronto residents those that object to these projects may well not be their first inhabitants. Others who … Continue reading Vulnerabilities and soft targets