SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Artificial intelligence (AI)
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Vanderbilt examines the risks and benefits of smart cities and ways to counter cyber threats

19 Apr 2018

Vanderbilt examines the risks and benefits of smart cities and ways to counter cyber threats
Contact company
Contact Vanderbilt Industries
icon Add as a preferred source Download PDF version

Advancements in AI, as well as Internet of Things (IoT) connected devices, have made it possible for cities to increase efficiencies across services like transportation, water management, and healthcare. To do this, smart cities rely on interconnected devices to streamline and improve city services based on rich, real-time data.

However, the fast adoption pace of networked technologies is potentially creating a deep well of vulnerabilities. There are already millions of smart home devices in the world, including smart alarms, locks, lighting, baby monitors, and thermostats and televisions. It is predicted that there will be more than 21 billion connected devices by 2020.

Consequences of information getting hacked

As smart cities rely on accurate data to properly function, if information is hacked, it has the potential to bring a city to a standstill. For instance, traffic control systems could be exploited to cause jams or crashes. Other risks include subways grinding to a halt, or water supplies being contaminated.

Targeting people opens the door to the ‘weakest link’ and can uncover vulnerabilities such as lack of authentication and encryption

This scenario is not as far-fetched as it may sound. In 2011, hackers gained control of the water control system in Ohio and destroyed a pump that serviced 2,200 customers. Furthermore, hacking entry points can be quite straightforward to unleash this chaos. For instance, smart lights bulbs and vending machines on a college campus were recently used as a starting point to launch a cyberattack against an unnamed university in the US.

Targeting people to hack data

The most obvious low hanging fruit when targeting smart cities will be to target people. Targeting people opens the door to the ‘weakest link’ and can uncover vulnerabilities such as lack of authentication and encryption, and weak password storage that can allow attackers to gain access to systems.

Given the huge quantity of smart devices now in our everyday life, defending against the sheer volume of attacks will become a challenge for smart cities. In a report by Cisco Cybersecurity in 2017, 35 percent of chief information security officers and security operations professionals said they see thousands of daily cyber threats, but only 44 percent are investigated.

Implementing best data security measures

Realistically, in the environment of a smart city, from smart meters to intelligent transportation infrastructure and sensors, they are likely to capture a lot of data about us as individuals. This data may be used to provide better services, efficiency, and other smart-city goals. That said, this also means lots of data, including personal information, is collected, stored, and used in a smart city. This will make smart cities a very tempting target to attack for hackers. That is why it is crucial that best security practices are built into a smart city’s means of data-gathering and processing.

The SPC intruder detection system has been designed so that should an attack penetrate, such as Denial-of-Service, the system has multiple communication paths available as a backup

For instance, the amount of data that IoT devices can create is colossus. A Federal Trade Commission report entitled ‘Internet of Things: Privacy & Security in a Connected World’ found that less than 10,000 households can produce 150 million distinct data points daily.

SPC intruder detection system

Physical security has moved from being very simple inputs and outputs, to being always-connected devices. This makes the industry very much part of the IoT world. This has changed how Vanderbilt thinks when designing and developing their own security systems, in particular SPC. This intruder detection system has been designed so that should an attack penetrate, such as Denial-of-Service, the system has multiple communication paths available as a backup.

Therefore, if one server is flooded and taken down, the system can immediately switch to a backup server and then change communication paths to bypass the attack and ensure messages still operate successfully. So, the system will remain operational, and it will still be able to communicate out, but it will start to shut down elements of itself to protect the system from further damage in the attack.

Advantages of smart cities

Of course, it is not all doom and gloom. Smart cities are springing up at a rapid rate for a reason. In Barcelona, smart water meter technology is helping the city save $58 million per year. In South Korea, one city cut building operating costs by 30 percent after implementing smart sensors to regulate water and electricity usage.

According to the United Nations, 66 percent of the world’s population will live in cities by 2050. This will have many varying effects, including in transportation, energy, and health and safety. Cities consume 75 percent of all energy and are responsible for 40 percent to 60 percent of greenhouse gasses. Air quality remains a concern, including so-called ‘black rivers’ of pollution in urban areas that are leading to an increase of respiratory disease.

Employing more machine learning algorithms to scour the web for vulnerabilities ahead of time could be a possible solution to combat vulnerabilities

The impact of congestion on emergency response and waste management also must come into consideration. As seen by the success stories in Barcelona and South Korea, smart cities can help combat these problems and thus will play a key role in benefiting the lives of its citizens.

Investing in IT infrastructure to prevent cyberattacks

So, while technology will help to change some of these problems for the better, security for smart cities must come first and foremost. Employing more machine learning algorithms to scour the web for vulnerabilities ahead of time could be a possible solution to combat vulnerabilities.

Naturally, cyberattacks and data breaches can’t be avoided entirely. But rather than trying to accomplish the impossible, smart cities should focus on investment in IT infrastructure capable of resisting outside attacks.

This includes forcibly shutting down potentially hacked systems until security experts can resolve vulnerability issues. One must remember that technology’s growth also means that security defences are developing in parallel. At its core, security is about being continuously observant, following best practices, and being ready and able to react against a security issue.

Deploying network intrusion mechanisms

With IoT devices, security is now an endless game of cat and mouse in staying ahead of the latest threats and hacking innovations. Therefore, vulnerability testing is also a valuable weapon in your overall defensive arsenal. As well, as vulnerability testing its systems, Vanderbilt has various other forms of obstacles and barriers to deter and deceive would-be hackers.

The encryption used by FlexC communications between panels and the cloud is an AES 256-bit SSL encryption

Encrypting sensitive data and deploying network intrusion mechanisms that can regularly scan for suspicious activity and protect against hackers trying to breach control systems remotely is also another key step to take.

FlexC, Vanderbilt’s communications protocol, was built from the ground up solely with cybersecurity in mind. The protocol is a bespoke design that ensures everything is encrypted, all communications are monitored, and multiple types of attack are considered for defensive purposes to provide the best security possible. The encryption used by FlexC communications between panels and the cloud is an AES 256-bit SSL encryption.

Adding an extra layer of security

By encrypting anything before you send it to the cloud, it adds an extra cushion of control and power over that data. It not only provides an added defensive structure around a company's information, but it also adds peace of mind to the equation when relaying this data to the cloud.

Having an environment within the software industry of open disclosures only means that we can learn from mistakes, we can see how hackers are attempting to breach systems, and ultimately, it can help us stay ahead of the curve and one-step clear of hackers’ latest intentions. When vulnerabilities are reported, it just means that testing down the line will improve.

However, one of the most obvious places to start is to choose equipment from reliable suppliers that have a knowledge and interest in cybersecurity and are focused on protecting your data. When your security system is designed from the ground up to protect against cyberattacks, naturally your organisation will be in a much better place.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Physical security
  • Intrusion detection
  • Internet of Things (IoT)
  • Home Security Systems
  • Data Security
  • Artificial intelligence (AI)
  • Smart home
  • Related categories
  • Intruder detectors
Related white papers
Elevating security through multi-sensing solutions and large-scale AI

Elevating security through multi-sensing solutions and large-scale AI

Download
The 4 pillars of AI in managing high-stakes critical events

The 4 pillars of AI in managing high-stakes critical events

Download
How biometrics are reshaping security in a connected world

How biometrics are reshaping security in a connected world

Download
Related articles
Suprema BioStation 3 sets global sales record

Suprema BioStation 3 sets global sales record

A landmark gathering shaping the future of real estate, investment, sustainability & design

A landmark gathering shaping the future of real estate, investment, sustainability & design

Leuze AI elevates optical sensor precision

Leuze AI elevates optical sensor precision

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Artificial intelligence (AI)
  4. News
  5. Corporate news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec