Smart cities are transforming urban landscapes around the world, leveraging the power of the Internet of Things (IoT) to improve efficiency, sustainability, and the quality of life. In this post, I will explore the diverse range of IoT device domains that will form domain ontologies to support cyber security monitoring and detection. Smart Sensors Domain: … Continue reading Scope of smart city domain ontologies for cyber security
Category: Smart City Cyber Security
The increasing development of cyber-physical technology in a smart city means an equal increase in the threat landscape and risk of cyber attack. The UK Government has recently published an interesting paper on the vision of cyber-physical infrastructure. This PDF covers the diverse range of capabilities offered by cyber-physical technologies including some interesting semantic topics … Continue reading Smart City Cyber Security Ontology and Inferencing Proof of Concept overview.
I am going to use the Cisco SAFE security reference architecture as a complimentary method to NIST CSF to help explain how these methods can be used to support a Smart City Cyber Security Strategy. SAFE is further expanded through its identification of threat types and mapping to MITRE ATT&CK. In particular i will focus … Continue reading Cisco SAFE security reference architecture
Introduction to a series of posts and resources i plan to put together to outline the key aspects of a Cyber Security Framework for a Smart City strategy. Having recently acted as an Advisor to a new Innovate UK research project I thought I would use and adapt some of the recommendations, for problems I … Continue reading Cyber Security Framework for Smart Cities – part 1
The example high level Criteria taxonomy below provides guidance on the types of capability characteristics needed to detail a specific view of how the capability will be made up. This should be supported by a lower level of Criteria, that will need to extend this high level set with the attributes needed to address specific … Continue reading Defining the capability criteria for required Smart City cyber security
As part of the wider Evidence Initiative, The Economist Intelligence Unit (EIU)—the research and policy arm of The Economist Group—has produced a first-of-its-kind Evidence Map to track the availability and characteristics of data in Group of 20 (G20) countries that policymakers need to make sound decisions. - The Economist Group and The Pew Charitable Trusts … Continue reading The Evidence Initiative and Smart Cities
It is important to select the right cyber security capabilities necessary to fulfil the scope and vision for a Smart City and the individual cyber security requirements. There may be potentially over 100 cyber security capabilities needed to support a large Smart City organisation and services. They could be chosen from a best practice framework … Continue reading Cyber Security Capabilities for a Smart City Cyber Security Strategy
There will come a point in the development and transition of a City into a Smart City where cyber security becomes paramount and for many cities that point may already have been reached. It is at this point a City must assess its ability to deal with a new threat landscape and prepare a strategy … Continue reading Smart City Cyber Security Strategy
If there is one lesson to learn from the cyber security incidents that have plagued public and private organisations it is a problem of the lack of knowledge of assets, appropriate configurations and impact assessments. Asset and configuration management has over, the last 20 years, been a troubling story and cyber attacks have benefited from … Continue reading Smart City Cyber Security Ontology
Following the recent publication of a report on ‘Smart City Cybersecurity’, produced by technology market data analysis firm ABI Research, there have been a series of supporting news articles. Many just covering the basics of the report but a few go on to push the arguments. Here are a few of the more informative. SiteArticleGovernment … Continue reading The impetus that drives cyber security