Techiexpert.com
No Result
View All Result
  • Tech
  • Startup
  • Artificial Intelligence
  • IOT
  • Big Data
  • Cloud
  • Data Analytics
  • Machine Learning
  • Blockchain
No Result
View All Result
  • Tech
  • Startup
  • Artificial Intelligence
  • IOT
  • Big Data
  • Cloud
  • Data Analytics
  • Machine Learning
  • Blockchain
No Result
View All Result
Techiexpert.com
No Result
View All Result

Security for Smart Cities: why it Start and end their innovations with security

Srikanth by Srikanth
November 1, 2021
in Tech news
0
Security for Smart Cities: why it Start and end their innovations with security
10
SHARES
135
VIEWS
Share on FacebookShare on Twitter

Around the world, globalization and the advent of technology have made modern settlements rebuild themselves into digitally smarter, sustainable versions of themselves. With modern populations becoming more and more digitally literate, governments, and by extension, modern cities have to reorient their definitions of basic necessities and incorporate digital innovations to facilitate ease of living and improve digital connectivity.

In essence, a smart city strives to build an infrastructure that integrates the management and visibility of all its services from a single operations center. However, along with the concept of digital smartness comes the necessity to secure such systems and the inherent risks that need to be addressed before building such systems.

Ever since the launch of the Smart City Scheme by the Indian Government, Tier 1 and Tier 2 cities across the nation have been striving to integrate IoT into existing supply chains to dynamically improve the way in which the needs of the residents are being addressed. While this endeavor may result in a streamlined process, improve operational efficiency, and result in better economic and environmental sustainability, the fact remains that for such smart city conceptions to become a reality, massive amounts of data need to go through IoT devices as well as the cloud/on-premise data centers being used by the government in question.

In this scenario, it wouldn’t be implausible to mark smart city projects as some of the most vulnerable to cyber-attacks. With attackers increasing the intensity as well as the frequency of breach attempts in recent times, a smart city security strategy that is designed to make smart city infrastructures resilient to cyber attacks is the need of the hour.

The Data Quandary

Smart cities have to deal with massive amounts of open data, which form the basis of better management and deployment of smart technologies on such a large scale, on a city wide level. In a connected environment such as a smart city, compromise of a single device would be akin to pushing a single domino in a stack and lead to an imminent fall of the entire infrastructure. As such, concerns with regard to privacy are bound to arise. In fact, over the past two decades, these cities have historically been the victims of some of the most common types of cyber attacks, including Data Theft, MITM, and DDoS attacks. This means that when it comes to a resilient security posture, governments tend to ignore that aspect, a decision that would come to haunt them back later.

Incorporating Security for Smart Cities

The push for Zero Trust has been global in recent times, and Smart Cities would do well with the implementation of the Zero Trust Strategy as well. The Zero Trust Strategy, which twins itself with a tagline of “Never Trust Always Verify,” hinges on three basic principles,

  • Least Privilege Access: Zero trust Models don’t rely on network locality as a factor for determining trust. This means that any device or any asset wishing to connect to the network or access critical resources is innately distrusted from the outset. Even when trust is established, access is provided only on a need to know basis or a least privileged basis
  • Continuous Authentication and Authorization: Zero Trust Models continuously and independently assess the risk associated with each access request, and review the context of each request before granting access
  • Monitoring and Visibility: One of the most important pillars of a Zero Trust Model pertains to visibility and monitoring of all network traffic and granular control over who accesses what.

A Zero trust Strategy would definitely go a long way towards securing IoT-based infrastructures from cyber attacks. But while IoT Security has to be addressed when it comes to framing cyber security strategies for smart cities, but it shouldn’t be limited to that. Governments of the day tend to focus on using multiple point solutions to prevent cyber attacks, an approach that leads to fragmented visibility and a web of vulnerabilities. Instead, governments need to assess the market for newer, disruptive solutions and approaches that converge security possibilities into a single concerted approach to security. Forrester’s Zero Trust Edge and Gartner’s Secure Access Service Edge speak about an amalgamation of existing security technologies into a single solution that leverages Zero Trust principles to remove any scope of vulnerabilities.

Of course, Smart City Security must not limit itself to the security of the devices but extend to securing the human aspects of the infrastructure. To ensure the same, security teams need to implement the following:

  1. Deploying a 360-degree monitoring and visibility infrastructure. Maintaining complete visibility is necessary because the identification of the source of a breach in real-time can lead to rapid mitigation 
  2. Cyber Hygiene practices amongst the workforces, backed by stringent access policies
  3. Integration of the security stack into a single centralized solution that can identify threat vectors and recover from incidents rapidly.
  4. Using a combination of security devices, human controls, and physical devices to build a resilient security setup

As cities improve their technologies, the risks are bound to multiply as well. In this scenario, a long-term strategy that focuses on securing not only devices or data but also identities and users becomes the need of the hour. Cyber security for the city of the future is an indispensable part of every city’s growth story and will continue to be so.

Contributed by Sandip Kumar Panda, Co-founder and CEO at Instasafe

Tags: CybersecurityInstaSafeSandip Kumar PandasmartcitiesTech Stories

Popular this week

  • Renesas Expands IoT Footprint with Sequans Acquisition

    Renesas Expands IoT Footprint with Sequans Acquisition

    2129 shares
    Share 851 Tweet 532
  • Y2Mate.com 2023: How to Download Videos and Audios

    242 shares
    Share 97 Tweet 61
  • Top 10 Omegle Alternatives you might like

    333 shares
    Share 133 Tweet 83
  • What is windows modules installer ? How to Enable/Disable

    124 shares
    Share 50 Tweet 31
  • Top 10 YouTube to MP3 Converter Platforms for Free

    97 shares
    Share 39 Tweet 24
  • Does God Play Dice? – A Quantum Perspective

    43 shares
    Share 17 Tweet 11

Latest Stories on TechiExpert

Tamil Nadu CM MK Stalin Unveils Ambitious Startup and Innovation Policy 2023

Tamil Nadu CM MK Stalin Unveils Ambitious Startup and Innovation Policy 2023
Share4Tweet3Share1Pin1

Bengaluru Fintech Startup Converj Targets B2B Payments with Virtual Credit Cards

Bengaluru Fintech Startup Converj Targets B2B Payments with Virtual Credit Cards

Pay for goods by credit card through a smartphone in a coffee shop.

Share4Tweet3Share1Pin1

EaseMyAI raises Rs. 3 Crore in Seed Round led by IPV

EaseMyAI raises Rs. 3 Crore in Seed Round led by IPV
Share5Tweet3Share1Pin1

Veera India’s Mobile Only Internet Browser by Marquee Investors and Entrepreneurs

Veera India’s Mobile Only Internet Browser by Marquee Investors and Entrepreneurs
Share5Tweet3Share1Pin1
  • Privacy Policy
  • About Us
  • Contact us
  • Cookie Policy
  • Write For Us

© 2016-2022 All Rights Reserved

No Result
View All Result
  • Tech
  • Startup
  • Artificial Intelligence
  • IOT
  • Big Data
  • Cloud
  • Data Analytics
  • Machine Learning
  • Blockchain

© 2016-2022 All Rights Reserved

Cookie Law Notice
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
SAVE & ACCEPT
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.