Thursday, June 30, 2022
Techiexpert.com
No Result
View All Result
  • Login
  • Register
Exclusive Videos
  • Tech news
  • Startup news
  • Artificial Intelligence
  • IOT
  • Big Data
  • Cloud
  • Data Analytics
  • Machine Learning
  • Blockchain
  • Social Media
  • Tech news
  • Startup news
  • Artificial Intelligence
  • IOT
  • Big Data
  • Cloud
  • Data Analytics
  • Machine Learning
  • Blockchain
  • Social Media
No Result
View All Result
TechiExpert
No Result
View All Result

Security for Smart Cities: why it Start and end their innovations with security

Srikanth by Srikanth
November 1, 2021
in Tech news
Reading Time: 4 mins read
Security for Smart Cities: why it Start and end their innovations with security
15
SHARES
196
VIEWS
Share on FacebookShare on Twitter

Around the world, globalization and the advent of technology have made modern settlements rebuild themselves into digitally smarter, sustainable versions of themselves. With modern populations becoming more and more digitally literate, governments, and by extension, modern cities have to reorient their definitions of basic necessities and incorporate digital innovations to facilitate ease of living and improve digital connectivity.

In essence, a smart city strives to build an infrastructure that integrates the management and visibility of all its services from a single operations center. However, along with the concept of digital smartness comes the necessity to secure such systems and the inherent risks that need to be addressed before building such systems.

Ever since the launch of the Smart City Scheme by the Indian Government, Tier 1 and Tier 2 cities across the nation have been striving to integrate IoT into existing supply chains to dynamically improve the way in which the needs of the residents are being addressed. While this endeavor may result in a streamlined process, improve operational efficiency, and result in better economic and environmental sustainability, the fact remains that for such smart city conceptions to become a reality, massive amounts of data need to go through IoT devices as well as the cloud/on-premise data centers being used by the government in question.

In this scenario, it wouldn’t be implausible to mark smart city projects as some of the most vulnerable to cyber-attacks. With attackers increasing the intensity as well as the frequency of breach attempts in recent times, a smart city security strategy that is designed to make smart city infrastructures resilient to cyber attacks is the need of the hour.

The Data Quandary

Smart cities have to deal with massive amounts of open data, which form the basis of better management and deployment of smart technologies on such a large scale, on a city wide level. In a connected environment such as a smart city, compromise of a single device would be akin to pushing a single domino in a stack and lead to an imminent fall of the entire infrastructure. As such, concerns with regard to privacy are bound to arise. In fact, over the past two decades, these cities have historically been the victims of some of the most common types of cyber attacks, including Data Theft, MITM, and DDoS attacks. This means that when it comes to a resilient security posture, governments tend to ignore that aspect, a decision that would come to haunt them back later.

Incorporating Security for Smart Cities

The push for Zero Trust has been global in recent times, and Smart Cities would do well with the implementation of the Zero Trust Strategy as well. The Zero Trust Strategy, which twins itself with a tagline of “Never Trust Always Verify,” hinges on three basic principles,

  • Least Privilege Access: Zero trust Models don’t rely on network locality as a factor for determining trust. This means that any device or any asset wishing to connect to the network or access critical resources is innately distrusted from the outset. Even when trust is established, access is provided only on a need to know basis or a least privileged basis
  • Continuous Authentication and Authorization: Zero Trust Models continuously and independently assess the risk associated with each access request, and review the context of each request before granting access
  • Monitoring and Visibility: One of the most important pillars of a Zero Trust Model pertains to visibility and monitoring of all network traffic and granular control over who accesses what.

A Zero trust Strategy would definitely go a long way towards securing IoT-based infrastructures from cyber attacks. But while IoT Security has to be addressed when it comes to framing cyber security strategies for smart cities, but it shouldn’t be limited to that. Governments of the day tend to focus on using multiple point solutions to prevent cyber attacks, an approach that leads to fragmented visibility and a web of vulnerabilities. Instead, governments need to assess the market for newer, disruptive solutions and approaches that converge security possibilities into a single concerted approach to security. Forrester’s Zero Trust Edge and Gartner’s Secure Access Service Edge speak about an amalgamation of existing security technologies into a single solution that leverages Zero Trust principles to remove any scope of vulnerabilities.

Of course, Smart City Security must not limit itself to the security of the devices but extend to securing the human aspects of the infrastructure. To ensure the same, security teams need to implement the following:

  1. Deploying a 360-degree monitoring and visibility infrastructure. Maintaining complete visibility is necessary because the identification of the source of a breach in real-time can lead to rapid mitigation 
  2. Cyber Hygiene practices amongst the workforces, backed by stringent access policies
  3. Integration of the security stack into a single centralized solution that can identify threat vectors and recover from incidents rapidly.
  4. Using a combination of security devices, human controls, and physical devices to build a resilient security setup

As cities improve their technologies, the risks are bound to multiply as well. In this scenario, a long-term strategy that focuses on securing not only devices or data but also identities and users becomes the need of the hour. Cyber security for the city of the future is an indispensable part of every city’s growth story and will continue to be so.

Contributed by Sandip Kumar Panda, Co-founder and CEO at Instasafe

Tags: CybersecurityInstaSafeSandip Kumar PandasmartcitiesTech Stories
Share6Tweet4Share1Pin2

Related Posts

Ways Data Analysis has changed customer reward programs
Tech news

Ways Data Analysis has changed customer reward programs

Digital Learning face recognition
Tech news

Here’s why Deep Learning might not be enough for celebrity face recognition

VPS Helps Forex Trading
Tech news

Staying Safe When Trading on a Trading App

Mozilla launches Thinderbird for android
Tech news

Mozilla launches Thinderbird for android

Is Signal an alternative to Whatsapp?
Tech news

Is Signal an alternative to Whatsapp?

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Most Read

  • How to Track Someone’s iPhone by Phone Number?

    How to Track Someone’s iPhone by Phone Number?

    324 shares
    Share 130 Tweet 81
  • Top 5 car automation trends to know

    149 shares
    Share 60 Tweet 37
  • What is windows modules installer ? How to Enable/Disable

    1234 shares
    Share 494 Tweet 309
  • Is Parody Coin investment a Good Investment?

    63 shares
    Share 25 Tweet 16
  • Tips to Reduce Your Website Hosting Costs

    870 shares
    Share 348 Tweet 217
  • How to Track Activities an Instagram account?

    81 shares
    Share 32 Tweet 20

Recent Stories

Does domain extensions impact SEO standards

Does domain extension impact SEO standards
Share4Tweet3Share1Pin1

How Enterprise Blockchain can enable Privacy Preservation

How Enterprise Blockchain can enable Privacy Preservation
Share5Tweet3Share1Pin1

How to flip NFT’s

How to flip NFTs
Share4Tweet3Share1Pin1

Data Analytics startup USEReady launches a new centres

Data Analytics startup USEReady launches a new centres
Share5Tweet3Share1Pin2
  • Terms of use
  • Privacy Policy
  • About Us
  • Contact us
  • Write For Us
  • Cookie Policy

© 2022 All Rights Reserved

No Result
View All Result
  • Tech news
  • Startup news
  • Artificial Intelligence
  • IOT
  • Big Data
  • Cloud
  • Data Analytics
  • Machine Learning
  • Blockchain
  • Social Media

© 2022 All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Cookie Law Notice
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT