Javascript must be enabled to continue!
Cybersecurity Threats and Mitigations Related to Smart Cities Operation
View through CrossRef
Smart cities are managed and controlled through comprehensive and complex information systems. The main characteristics of smart cities are expressed in the massive reliance on computerized systems, which comprise large, distributed databases, integrated complex software systems, WAN with a vast number of terminals connected to the Internet and cloud computing, and physical systems fully computerized and remotely controlled. Smart cities are more likely to be sophisticated and more affluent than common cities, making them attractive to cybersecurity attackers motivated by theft and benefits stealing, such as ransom. The concept of smart cities is catching attention across the globe, and it is important in per context of emerging economies. It is inevitable to assume that smart cities incorporate all kinds of system vulnerabilities, which are more likely to be known and exploited by malicious cybersecurity attackers. This chapter elaborates on the leading cybersecurity risks more likely to be encountered in smart cities. We present current concepts and technologies available for mitigating them and provide a comprehensive solution for safe, smart cities.
Title: Cybersecurity Threats and Mitigations Related to Smart Cities Operation
Description:
Smart cities are managed and controlled through comprehensive and complex information systems.
The main characteristics of smart cities are expressed in the massive reliance on computerized systems, which comprise large, distributed databases, integrated complex software systems, WAN with a vast number of terminals connected to the Internet and cloud computing, and physical systems fully computerized and remotely controlled.
Smart cities are more likely to be sophisticated and more affluent than common cities, making them attractive to cybersecurity attackers motivated by theft and benefits stealing, such as ransom.
The concept of smart cities is catching attention across the globe, and it is important in per context of emerging economies.
It is inevitable to assume that smart cities incorporate all kinds of system vulnerabilities, which are more likely to be known and exploited by malicious cybersecurity attackers.
This chapter elaborates on the leading cybersecurity risks more likely to be encountered in smart cities.
We present current concepts and technologies available for mitigating them and provide a comprehensive solution for safe, smart cities.
Related Results
Smart home cybersecurity awareness and behavioral incentives
Smart home cybersecurity awareness and behavioral incentives
Purpose
Smart-home security involves multilayered security challenges related to smart-home devices, networks, mobile applications, cloud servers and users. However, very few studi...
Reinventing Smart Water Management System through ICT and IoT Driven Solution for Smart Cities
Reinventing Smart Water Management System through ICT and IoT Driven Solution for Smart Cities
Purpose: Worldwide water scarcity is one of the major problems to deal with. Smart Cities also faces this challenging problem due to its ever-increasing population and limited sour...
Cultivating self-efficacy to empower professionals’ re-up skilling in cybersecurity
Cultivating self-efficacy to empower professionals’ re-up skilling in cybersecurity
Purpose
The accelerated digital transformation and the growing emphasis on privacy, safety and security present ongoing challenges for cybersecurity experts. Alongside these challe...
CYBERSECURITY IN THE FINANCIAL SECTOR: A COMPARATIVE ANALYSIS OF THE USA AND NIGERIA
CYBERSECURITY IN THE FINANCIAL SECTOR: A COMPARATIVE ANALYSIS OF THE USA AND NIGERIA
This paper provides a comprehensive review and comparative analysis of cybersecurity challenges and strategies within the financial sectors of the United States of America (USA) an...
An Evolutionary Game Theoretic Analysis of Cybersecurity Investment Strategies for Smart-Home Users against Cyberattacks
An Evolutionary Game Theoretic Analysis of Cybersecurity Investment Strategies for Smart-Home Users against Cyberattacks
In the digital era, smart-home users face growing threats from cyberattacks that threaten their privacy and security. Hence, it is essential for smart-home users to prioritize cybe...
Cybersecurity Guidebook for Cyber-Physical Vehicle Systems
Cybersecurity Guidebook for Cyber-Physical Vehicle Systems
<div class="section abstract">
<div class="htmlview paragraph">This recommended practice provides guidance on vehicle Cybersecurity and was created based off of, and ...
Cybersecurity Guidebook for Cyber-Physical Vehicle Systems
Cybersecurity Guidebook for Cyber-Physical Vehicle Systems
<div class="section abstract">
<div class="htmlview paragraph">This recommended practice provides guidance on vehicle Cybersecurity and was created based off of, and ...
Generative AI-Driven Smart Contract Optimization for Secure and Scalable Smart City Services
Generative AI-Driven Smart Contract Optimization for Secure and Scalable Smart City Services
Smart cities use advanced infrastructure and technology to improve the quality of life for their citizens. Collaborative services in smart cities are making the smart city ecosyste...

