Do Smart Cities have Smart Security?
For over two decades, the rapidly growing urbanization, demographic trends and climate change are driving the transformation of our cities to smart digital cities. Smart cities combine their human capital with leading-edge ICT technologies in order to boost their sustainable economic growth and to improve the quality of life of their citizens. Nevertheless, the rise of smart cities introduces additional security vulnerabilities, which add up to pre-existing security challenges. For example, the increased digitization of modern cities adds cyber-security vulnerabilities that can be exploited by adversaries in order to attack the critical infrastructures and the social structures of modern cities. Such attacks can have tremendous socio-economic consequences, including a disruptive impact on the functioning of the city and life-threating implications for the citizens. Furthermore, in an era of rising urbanization, cities are confronted with more complex, asymmetric and unpredictable attacks, which usually compromise both cyber and physical assets. This is evident in some recent notorious security incidents in modern cities.
During the first decade of our millennium, several notorious security incidents and terrorist attacks have manifested that modern cities remain vulnerable to terrorists and criminals. These included for instance, the collapse of New York’s Twin Towers on 11th September 2001, the bombing of packed commuter trains in Madrid on 11th March 2004, the London bombings in July 2005 and the bombing of the Moscow metro in March 2010. In response to these attacks, cities have established sophisticated surveillance infrastructures, along with data driven systems that generate a Common Operational Picture (COP) of the city operations and enable advanced threat intelligence. More recently, a number of more unpredictable, asymmetric, integrated and more distributed attacks have occurred, a prominent example being the attacks in Paris in November in 2015, when gunmen and suicide bombers hit a concert hall, a major stadium, restaurants and bars, almost simultaneously – and left 130 people dead and hundreds wounded. The Paris attacks introduced also an entire new dimension of urban security and safety, namely the exploitation of digital infrastructure for launching the attacks. Indeed, in the scope of the Paris attacks, social media were used for radicalizing young individuals and for supporting the execution of the attack. Furthermore, as cities become smarter and more digital, the importance of cybersecurity increases, as evident in recent attacks against smart cities’ infrastructures. For example, in March 2018, a cyberattack on poorly secured public computer systems in the smart city of Atlanta had a long-term disruptive effect on some of the city’s functions and led to a total recovery cost of over $10 million. As cities become digitally mature and smart, their vulnerability to cyber security attacks increases.
In this context, state of the art security and surveillance infrastructures for smart cities fall short when it comes to preventing and confronting novel, asymmetric, decentralized and highly unpredictable attacks or complex civil protection incidents. State-of-the-art security platforms tend to consider cyber and physical security in isolation rather than as part of an integrated approach. This fragmentation of security platforms becomes very challenging when it comes to protecting multiple decentralized spaces and infrastructures (e.g., malls, theaters, exhibition centers, buildings, energy plants, factories) within a city. Each of these spaces is typically supported by a different set of security and surveillance systems, which are not interoperable with each other. Likewise, different security and safety stakeholders such as first responders, municipal authorities, critical infrastructures operators, cybersecurity officers, and Law Enforcement Agencies (LEAs), tend to operate a variety of different systems that are non-interoperable as well. Therefore, there is no easy way for these stakeholders to share information and to collaborate both before and during the occurrence of largescale asymmetric security events, when they must mobilize resources and collaborate with each other.
In order to effectively protect several public spaces of a city at the same time, there is a need for deploying a very large number of security resources including humans (e.g., security officers) and systems (e.g., security probes), as a means of collecting and processing large numbers of surveillance data streams like streams from cameras, CCTV (Closed Circuit TV) systems and other sensing and surveillance platforms. As the number of public spaces that must be simultaneously protected grows, this approach can become very costly and impractical.
In light of these challenges, future systems for security smart cities must be characterized by the following properties:
Overall, contemporary ICT technologies create significant challenges for urban security, yet they also offer opportunities for creating novel, intelligent and cost-effective security environments that make cities more secure at a cost of some reasonable investments in ICT technologies. This can prepare cities for confronting the recent wave of complex, asymmetric and unpredictable security attacks.
Digital Customer Experience: A Critical Success Factor during COVID19 and in the New Normal
Enterprise Software Development: Core Competence or Commodity?
Virtual Reality: A Powerful Tool for the Present and Future of Business Enterprises
CIOs in 2021: New Mindsets, Cultures and Leadership Rules
DataOps: Maximizing Efficiency of your Data
Getting the most from your Multi-Cloud Environment
Six Ingredients of Data Management Intelligence
Top Strategic Priorities for CIOs in 2021
Positioning Your IT for Success in 2021
Customer Centric Processes: From CRM to Customer Data Platforms
We're here to help!
No obligation quotes in 48 hours. Teams setup within 2 weeks.
If you are a Service Provider looking to register, please fill out this Information Request and someone will get in touch.
Outsource with Confidence to high quality Service Providers.
If you are a Service Provider looking to register, please fill out
this Information Request and someone will get in
Enter your email id and we'll send a link to reset your password to the address
we have for your account.
The IT Exchange service provider network is exclusive and by-invite. There is
no cost to get on-board;
if you are competent in your areas of focus, then you are welcome. As a part of this exclusive