Skip to content

Smart City Cyber Security

Cyber Security for the development of Smart Cities

  • Home
  • About & Contact
    • Mission and Overview
  • Security Research
    • STIX 2.1 ontology model POC with Stardog using knowledge graphs and RDF
    • Digital Twin Design and Development for Smart Cities
    • Digital Twin POC with Neo4j and Protege
      • AWS IOT Things Graph Data Model (TDM) Security Use Cases
      • Model the Smart City Digital Twin Environment
      • Smart City Digital Twin OWL Ontology Design
      • Digital Twin data integration with Neo4j
      • Analysis of Smart City Digital Twin and reference data
      • Vehicle Function and Traffic Light Digital Twins security scenario
  • SC Cyber Security Framework
    • Identify
      • Smart City Asset Management Design Pattern
  • SC Cyber Security
    • Cyber Security Management
      • Smart City Cyber Maturity
      • Smart City Security Controls
    • Smart City Threat Model
      • Smart City Threat Model Examples
        • eScooter Attack Model 1
        • eScooter Attack Model 2
      • Objectives of Smart City Threat Modelling
      • Smart City Threat Model Scope
      • Smart City Threat Model Threat Actors
      • Smart City Threat Model and Threat Landscape
      • Defining Smart City Threat Model Vectors
      • Smart City Threat Model & Vulnerabilities
      • Smart City Threat Models & Threat Trees
      • Smart City Threat Model Risk and Impact Analysis
      • Smart City Threat Model Mitigation Strategy
      • Smart City Threat Model Mitigation Tactics
    • Smart City Classification
      • Smart City Cyber Security Ontology
      • Smart City Cyber Security Taxonomies
      • Smart City Controlled Vocabulary
    • Smart City Threat Scenarios
    • Research Observations
  • SC Security Guides
    • Monitoring Strategies
    • Knowledge Management Charter
    • Value Assurance
  • Security Resources
    • Smart City Cyber Security Models

Scooter Attack Model 2

  • Scooter Attack Model showing Mitre Att&ck
    Scooter Attack Model showing Mitre Att&ck

Share this:

  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to email a link to a friend (Opens in new window) Email
Like Loading...

Translate

December 2025
M T W T F S S
1234567
891011121314
15161718192021
22232425262728
293031  
« Jun    

Categories

  • Application Ontology
  • Cisco SAFE
  • City Attacks
  • Cyber Security
    • CIS Security Controls
    • Cyber Security Framework
    • Cyber Security Strategy
    • NIST Cyber Framework
  • Digital Twin
  • Domain Ontology
  • Enterprise Ontology
  • GIST Ontology
  • IOT
  • MS Azure
  • RISK
  • Security Controls
  • Smart City
    • Asset Management
    • Smart City Administration
    • Smart City Framework
    • Smart City IOT
    • Smart City Mobility
    • Smart City Ontology
    • Smart City Regulation
    • Smart City Security
    • Smart City Strategy
    • Smart City Structure
    • Smart City Transformation
    • Smart City Transportation
  • Smart City Cyber Security
    • Smart City Cyber Security Capabilities
    • Smart City Cyber Security Capability
    • Smart City Cyber Security Ontology
    • Smart City Cyber Security Strategy
    • Smart City Threat Model
    • Smart City Vulnerability
  • stardog
  • Strategic Context

Tags

ABI Research Actors Application Ontology Attack Vector AWS Bleutech Park Borger Business Function Business Governance C2M2 Capability Capability Architecture CMMC CNI Connected City Connected Community Connected Home Cyber Maturity cybernetics Cyber Security Capabilities Cyber Security capability cyber security frameworks Cybersecurity Maturity Model Certification DDoS attack Design Guides Detect Capabilities Digital Twin DoD Domain Ontology Evidence Map Fort Lauderdale Google Identify Capabilities Investment in cybersecurity IoT attacks London MITRE ATT&CK MS Azure Digital Twin NCSC Monitoring Neo4j Neo4j Bloom Neosemantics New York NIST CSF Ontology Operating Model OWL Paris POC Protege Reconnaissance Recover Capabilities Respond Capabilities Roles and Responsibilities Schneier’s Law Smart Appliances smart cameras Smart City Smart City Attack Smart City Cyber Security Smart City Cyber Security Framework Smart City Transformation Smart Housing Stafford Beer stardog STIX Surveillance Texas The Economist Group Threat Environment Threat Landscape Threat Model Threats Viable System Model Waterfront Toronto

Top Posts & Pages

  • Recent cyber attacks on Cities
  • Cyber Security Capabilities for a Smart City Cyber Security Strategy
  • Cisco SAFE security reference architecture
Follow Smart City Cyber Security on WordPress.com

Tags

cyber security frameworks Digital Twin Domain Ontology Neo4j NIST CSF OWL Smart City Smart City Cyber Security Threat Landscape Threat Model

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 10 other subscribers
Blog at WordPress.com.
  • Subscribe Subscribed
    • Smart City Cyber Security
    • Already have a WordPress.com account? Log in now.
    • Smart City Cyber Security
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Copy shortlink
    • Report this content
    • View post in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...
 

    %d