SlideShare une entreprise Scribd logo
1  sur  23
Télécharger pour lire hors ligne
Overcoming the Cybersecurity Challenges of
Smart Cities
Dr. Saeed Al Dhaheri
Chairman,
@DDSaeed
Towards Dubai 2020 Smart City Conference, University of Dubai, 15th January 2017
Overcoming the Cybersecurity Challenges of Smart Cities
Agenda
• Introduction: Cybersecurity threats
• Cybersecurity landscape
• Examples: threats and incidents
• Smart City: what does it mean?
• Security of Smart Cities: 3 main factors
• Enabling Technologies for Smart Cities
• Cybersecurity Challenges and Solutions
• Cybersecurity Initiatives in UAE
INTRODUCTION: CYBERSECURITY THREATS
• Our society is now more vulnerable to cyber threats as we become more digitalized
• Half a million cyber attack each minute – Fortnet report
• The more connected IoT the more threats and risks
• 6.8 Billion IoT in 2016 expected to reach 20 Billion by 2020 – Gartner
• The more data recorded and stored in different locations the more threats
• Every two days the world create more data than the history of human kind until 2003
• Cyber attacks are getting more frequent and complex ----< smart city echo systems becomes
more vulnerable
• Increasing global trend to implement smart city initiatives
• More than 1000 smart city initiative by 2025
Can we maintain privacy and security of smart city?
Risks not only restricted to Loss,
theft, and financial but touches
Lives of people
CYBERSECURITY LANDSCAPE IS GETTING COMPLEX
• Organizational boundaries disappeared (anytime, anywhere, anyhow computing)
• Hackers become more intelligent with the new smart tools –< more complex and intelligent attacks
• Attacks exploit the weakest link in the value chain
• More advanced tools for discovery and protection
• Intelligent worms targeting IoT devices (wearables ,smart watches,,,etc)
• Jail breaking the clouds and VMs
• Ghostware to conceal attacks
• Blastware destroys or disable when detected
• Ransomware
Video Cameras are a leading
source of DDoS attacks
EXAMPLES: THREATS
• Possible threats:
• Hacking into Energy plants and manufacturing systems
• Hacking medical devices (pacemakers,,,etc)
• Hacking autonomous driving cars, or traffic lights network
• Hacking satellites
• Hacking financial and banking systems
• Hacking smart home systems
• Hacking Drones
Security & Risk management planning for smart cities becomes necessary
EXAMPLES: CYBERSECURITY INCIDENTS
DDoS attsck causes massive
Internet outage in East Cost
EXAMPLES: CYBERSECURITY INCIDENTS
• Attack resulted in people using transportation for free
• < 2000 devices were compromised
“You Hacked, ALL Data Encrypted. Contact For
Key(cryptom28@yandex.com)ID:681 , Enter”.
Ransom of 100 Bitcoin ($70000)
27/11/2016
SMART CITY: WHAT DOES IT MEAN?
• “A smart sustainable city is an innovative city that
uses information and communication technologies
(ICTs) and other means to improve quality of life,
efficiency of urban operation and services, and
competitiveness, while ensuring that it meets the
needs of present and future generations with respect
to economic, social and environmental aspects”.
• Key attributes:
• Sustainability
• Quality of life
• “Smartness” or Intelligence
Urban Dimensions
People Living
Governance
Environment
Mobility Economy
ITU Definition
SMART CITY: WHAT DOES IT MEAN?
PREDICTIONS
• 90% of cities in 2016 will lack comprehensive policies for Drones, sensors, and IoT –<
increased cybersec risks - IDC smart city 2016 predictions
• In 2017 at least one mid-size to large city will suffer a cyber attack that will impact its ability
to effectively function for one day. IDC
SECURITY OF SMART CITY: 3 FACTORS
• Public Safety
• Privacy
• Technologies and ICT Security
SMART CITY ENABLING TECHNOLOGIES
IoT
Cloud computing
Smart and mobile devices
Drones
Artificial Intelligence
Social Robotics
Social Media
Blockchain
3D Printing
Big Data Analytics
Renewable EnergyOpen Data
All those technologies are subject to cybersecurity risks. Protection requires Cybersecurity strategy
CYBERSECURITY CHALLENGES AND SOLUTIONS
• Insecure IoT devices and insufficient testing
• IoT devices easy to be hacked
• No encryption for data or communication, and no access control standard
• A study: < 200,000 traffic control devices in major cities around the world are vulnerable
• IoT vendors don’t emphasize security or provide weak security
• Solutions:
• Strong security criteria and standards for IoT devices
• Data encryption and traffic encryption between IoT and Data Centers
• Securing stored data, and policies
• Conduct penetration testing after installation
• Choose reputed vendors who offers strong security
CYBERSECURITY CHALLENGES AND SOLUTIONS
• No clear structure and governance for cybersecurity in the smart city initiative
• No clear leadership
• No Security Operations Center SOC
• No Smart City Risk management plan
• Solutions:
• Clear cybersecurity leadership and structure
• Example: Dubai electronic security center
• Appoint Chief Information Security Officer on a city level
• Clear roles and responsibilities for all concerned parties
• Risk management plan
• More collaboration between stakeholders are needs
CYBERSECURITY CHALLENGES AND SOLUTIONS
• Skill shortage in cybersecurity
• Solutions:
• Determine needs and coordinate with universities and training
centers
• Encourage UAE locals to study Cybersecurity and provide
scholarships
• Continue investing on training existing resources
• Provide incentives in the public and private sectors
CYBERSECURITY CHALLENGES AND SOLUTIONS
• Lack or insufficient legal framework and regulations
• Solutions:
• Review and amendment of the laws and regulations
• UAE law no 5 for 2012 for e-crimes
• International collaboration is required
• Training law enforcement and judicial staff to deal with cyber crimes
CHALLENGES AND SOLUTIONS
• Lack of Cybersecurity awareness among customers and employees
• Solutions:
• More Awareness campaigns
• Inside gov organizations for staff
• For customers
• Cooperation between law enforcement and citizens
Salim aeCERT initiative
CYBERSECURITY CHALLENGES AND SOLUTIONS
• Budget problem
• Solutions:
• Need leadership awareness about importance of cybersecurity
• Partnership programs through PPP to execute Smart city initiatives
UAE CYBERSECURITY INITIATIVES
• On the Federal level
• National Electronic Security Authority – NESA
• Computer Emergency Response Team – AE CERT
• On the local level
• Dubai Electronic Security Center
• Abu Dhabi Systems & Information Center – ADSIC
• On the private level
• Smartworld Cybersecurity Center
• Dark Matter
DUBAI ELECTRONIC SECURITY CENTER
• To secure the government network and information systems, and develop Dubai Info sec
policy and supervise its implementation
• Counter act the cybercrimes
• Develop Dubai cyber security strategy
• Focus on innovation in cybersecurity and spreading awareness
OVERVIEW OF SMARTWORLD
Smartworld and The Kernel joined hands to build the first cybersecurity center in the ME region, which will train
UAE nationals in cyber security and provide round-the-clock advanced security monitoring along with cyber threat
management to government and private sector companies in the UAE.
Training Services
Focused on
Cybersecurity in
Software, Networks,
and Social Engineering.
Exclusive Training Programs
designed by The Kernel and
Smartworld.
International Certification
Programs (ISC2, ISACA,
SANS).
Vendor Product
Training.
Security Auditing
and Reporting.
Penetration testing, attack
simulation, controlled DDoS
testing.
Consultation and Security
Solution Design
Assess
Verify
Protect
WebConvot WAF
Web Application
Firewall
Yubikey
Multi-factor
authenticator
WebPurifier
UTM
Unified Threat
Management
Elcomesoft
Recovery and
analysis suite
Oxygen
Mobile forensics
toolkit
EgoSecure
Endpoint
Security
Products
SECURING SMART CITIES INITIATIVE
• Global non–profit initiative to find solutions to overcome smart cities cybersecurity challenges
• Focus on cooperation between cities, companies, and governments and int orgs and individuals
• Guidelines about Info sec for Smart cities
• Provide a repository of research papers
End

Contenu connexe

Tendances

How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
PECB
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
PECB
 

Tendances (20)

Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
Iso iec 27032 foundation - cybersecurity training course
Iso iec 27032 foundation - cybersecurity training courseIso iec 27032 foundation - cybersecurity training course
Iso iec 27032 foundation - cybersecurity training course
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Cyber Security Standards Compliance
Cyber Security Standards ComplianceCyber Security Standards Compliance
Cyber Security Standards Compliance
 
Information security
Information securityInformation security
Information security
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
Cyber Security challenges in SMART city
Cyber Security challenges in SMART cityCyber Security challenges in SMART city
Cyber Security challenges in SMART city
 
Information security governance
Information security governanceInformation security governance
Information security governance
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity Audit
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
 

En vedette

mskanber-deloitte-nl-ps-smart-cities-report
mskanber-deloitte-nl-ps-smart-cities-reportmskanber-deloitte-nl-ps-smart-cities-report
mskanber-deloitte-nl-ps-smart-cities-report
M. Salih KANBER
 

En vedette (20)

Knowledge management in the uae government
Knowledge management in the uae governmentKnowledge management in the uae government
Knowledge management in the uae government
 
Connected IO: Smart Cities
Connected IO: Smart CitiesConnected IO: Smart Cities
Connected IO: Smart Cities
 
Next Generation Intelligent Transportation: Solutions for Smart Cities
Next Generation Intelligent Transportation: Solutions for Smart CitiesNext Generation Intelligent Transportation: Solutions for Smart Cities
Next Generation Intelligent Transportation: Solutions for Smart Cities
 
Lightscene 2016: Defining the Smart City
Lightscene 2016: Defining the Smart CityLightscene 2016: Defining the Smart City
Lightscene 2016: Defining the Smart City
 
Transforming Governments in the Cloud
Transforming Governments in the CloudTransforming Governments in the Cloud
Transforming Governments in the Cloud
 
Innovative Approaches for Smart City Development
Innovative Approaches for Smart City DevelopmentInnovative Approaches for Smart City Development
Innovative Approaches for Smart City Development
 
151116 smart city furniture trends
151116    smart city furniture trends151116    smart city furniture trends
151116 smart city furniture trends
 
Global City Teams Challenge Overview
Global City Teams Challenge OverviewGlobal City Teams Challenge Overview
Global City Teams Challenge Overview
 
Smart City Data Strategy
Smart City Data StrategySmart City Data Strategy
Smart City Data Strategy
 
Teppo Rantanen - Smart Citizen - Mindtrek 2016
Teppo Rantanen - Smart Citizen - Mindtrek 2016Teppo Rantanen - Smart Citizen - Mindtrek 2016
Teppo Rantanen - Smart Citizen - Mindtrek 2016
 
Wireless city ecosystem
Wireless city ecosystemWireless city ecosystem
Wireless city ecosystem
 
mskanber-deloitte-nl-ps-smart-cities-report
mskanber-deloitte-nl-ps-smart-cities-reportmskanber-deloitte-nl-ps-smart-cities-report
mskanber-deloitte-nl-ps-smart-cities-report
 
MESA- Cyber & Smart Cities - Updated
MESA- Cyber & Smart Cities - UpdatedMESA- Cyber & Smart Cities - Updated
MESA- Cyber & Smart Cities - Updated
 
From AirBox to Smart City: where are we and what's next?
From AirBox to Smart City: where are we and what's next?From AirBox to Smart City: where are we and what's next?
From AirBox to Smart City: where are we and what's next?
 
Understanding Smart Cities as Social Machines
Understanding Smart Cities as Social MachinesUnderstanding Smart Cities as Social Machines
Understanding Smart Cities as Social Machines
 
'(Un)Plugging Smart City Transformations & Strategies in Europe' Maynooth Uni...
'(Un)Plugging Smart City Transformations & Strategies in Europe' Maynooth Uni...'(Un)Plugging Smart City Transformations & Strategies in Europe' Maynooth Uni...
'(Un)Plugging Smart City Transformations & Strategies in Europe' Maynooth Uni...
 
Conference Smart City for developing countries: Why ? and How to Start?
Conference Smart City for developing countries: Why ? and How to Start?Conference Smart City for developing countries: Why ? and How to Start?
Conference Smart City for developing countries: Why ? and How to Start?
 
Re-imagining Cities. Newmarket Economic Development Symposium
Re-imagining Cities. Newmarket Economic Development SymposiumRe-imagining Cities. Newmarket Economic Development Symposium
Re-imagining Cities. Newmarket Economic Development Symposium
 
Becoming A Smart City
Becoming A Smart CityBecoming A Smart City
Becoming A Smart City
 
Ecologically Smart Cities with Urban Ecosystems Services
Ecologically Smart Cities with Urban Ecosystems ServicesEcologically Smart Cities with Urban Ecosystems Services
Ecologically Smart Cities with Urban Ecosystems Services
 

Similaire à Overcoming the cybersecurity challenges of smart cities

2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-22nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2
Jorge Rivero Sanchez
 
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxSecurity FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
S .Ali Raza
 
4B - Is the cloud safe - Ed Zedlewski
4B - Is the cloud safe - Ed Zedlewski4B - Is the cloud safe - Ed Zedlewski
4B - Is the cloud safe - Ed Zedlewski
CFG
 

Similaire à Overcoming the cybersecurity challenges of smart cities (20)

2017 Industry of Things World USA, San Diego CA
2017 Industry of Things World USA, San Diego CA 2017 Industry of Things World USA, San Diego CA
2017 Industry of Things World USA, San Diego CA
 
weyai cybersecurity.pptx
weyai cybersecurity.pptxweyai cybersecurity.pptx
weyai cybersecurity.pptx
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Emerging trends in computer science and related technologies
Emerging trends in computer science and related technologiesEmerging trends in computer science and related technologies
Emerging trends in computer science and related technologies
 
Smart Cities - The Security Aspects
Smart Cities - The Security AspectsSmart Cities - The Security Aspects
Smart Cities - The Security Aspects
 
Smart Cities – The Security Aspects
Smart Cities – The Security AspectsSmart Cities – The Security Aspects
Smart Cities – The Security Aspects
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-22nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2
 
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxSecurity FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
Building secure digital services
Building secure digital servicesBuilding secure digital services
Building secure digital services
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ... Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conferenceSMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
 
U nit 4
U nit 4U nit 4
U nit 4
 
Cyber Security Action Plan of RVNL
Cyber Security Action Plan of RVNLCyber Security Action Plan of RVNL
Cyber Security Action Plan of RVNL
 
Cybersecurity Risk from User Perspective
Cybersecurity Risk from User PerspectiveCybersecurity Risk from User Perspective
Cybersecurity Risk from User Perspective
 
4B - Is the cloud safe - Ed Zedlewski
4B - Is the cloud safe - Ed Zedlewski4B - Is the cloud safe - Ed Zedlewski
4B - Is the cloud safe - Ed Zedlewski
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Internet of Things (IoT) Security
Internet of Things (IoT) SecurityInternet of Things (IoT) Security
Internet of Things (IoT) Security
 

Plus de Saeed Al Dhaheri

Plus de Saeed Al Dhaheri (20)

The Power of Generative AI in Accelerating No Code Adoption.pdf
The Power of Generative AI in Accelerating No Code Adoption.pdfThe Power of Generative AI in Accelerating No Code Adoption.pdf
The Power of Generative AI in Accelerating No Code Adoption.pdf
 
Generative AI - Responsible Path Forward.pdf
Generative AI - Responsible Path Forward.pdfGenerative AI - Responsible Path Forward.pdf
Generative AI - Responsible Path Forward.pdf
 
The Future is in Responsible Generative AI
The Future is in Responsible Generative AIThe Future is in Responsible Generative AI
The Future is in Responsible Generative AI
 
How to Grow Tech Entrepreneurs in the UAE and the Arab world
How to Grow Tech Entrepreneurs in the UAE and the Arab worldHow to Grow Tech Entrepreneurs in the UAE and the Arab world
How to Grow Tech Entrepreneurs in the UAE and the Arab world
 
The future of remote work in the UAE government
The future of remote work in the UAE governmentThe future of remote work in the UAE government
The future of remote work in the UAE government
 
The UAE Digital Economy Post COVID-19: Value creation and policy recommendation
The UAE Digital Economy Post COVID-19: Value creation and policy recommendationThe UAE Digital Economy Post COVID-19: Value creation and policy recommendation
The UAE Digital Economy Post COVID-19: Value creation and policy recommendation
 
The digital startup ecosystem in the uae how to grow tech entrepreneurs
The digital startup ecosystem in the uae how to grow tech entrepreneursThe digital startup ecosystem in the uae how to grow tech entrepreneurs
The digital startup ecosystem in the uae how to grow tech entrepreneurs
 
The Future of Industry 4.0 in UAE
The Future of Industry 4.0 in UAEThe Future of Industry 4.0 in UAE
The Future of Industry 4.0 in UAE
 
Talent Strategies for the Digital Age
Talent Strategies for the Digital AgeTalent Strategies for the Digital Age
Talent Strategies for the Digital Age
 
How disruptive technologies are reshaping the future of cities
How disruptive technologies are reshaping the future of citiesHow disruptive technologies are reshaping the future of cities
How disruptive technologies are reshaping the future of cities
 
Clearing the Path to an AI Future in UAE
Clearing the Path to an AI Future in UAEClearing the Path to an AI Future in UAE
Clearing the Path to an AI Future in UAE
 
Organizational transformation towards Blockchain
Organizational transformation towards BlockchainOrganizational transformation towards Blockchain
Organizational transformation towards Blockchain
 
Cryptocurrencies: Current Reality and it's Future
Cryptocurrencies: Current Reality and it's FutureCryptocurrencies: Current Reality and it's Future
Cryptocurrencies: Current Reality and it's Future
 
Auditing in the Age of AI
Auditing in the Age of AIAuditing in the Age of AI
Auditing in the Age of AI
 
UAE AI Strategy and Achievements
UAE AI Strategy and AchievementsUAE AI Strategy and Achievements
UAE AI Strategy and Achievements
 
Artifical intelligence and the future of gcc governments
Artifical intelligence and the future of gcc governmentsArtifical intelligence and the future of gcc governments
Artifical intelligence and the future of gcc governments
 
Executing the UAE AI Strategy: Opportunities and Challenges
Executing the UAE AI Strategy: Opportunities and ChallengesExecuting the UAE AI Strategy: Opportunities and Challenges
Executing the UAE AI Strategy: Opportunities and Challenges
 
How AI is Transforming Government Services in the UAE
How AI is Transforming Government Services in the UAEHow AI is Transforming Government Services in the UAE
How AI is Transforming Government Services in the UAE
 
The UAE AI Strategy: Building Intelligent Enterprises
The UAE AI Strategy: Building Intelligent EnterprisesThe UAE AI Strategy: Building Intelligent Enterprises
The UAE AI Strategy: Building Intelligent Enterprises
 
How disruptive technologies are shaping the future of tourism
How disruptive technologies are shaping the future of tourismHow disruptive technologies are shaping the future of tourism
How disruptive technologies are shaping the future of tourism
 

Dernier

Competitive Advantage slide deck___.pptx
Competitive Advantage slide deck___.pptxCompetitive Advantage slide deck___.pptx
Competitive Advantage slide deck___.pptx
ScottMeyers35
 
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
gajnagarg
 
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
MadhuKothuru
 
Nagerbazar @ Independent Call Girls Kolkata - 450+ Call Girl Cash Payment 800...
Nagerbazar @ Independent Call Girls Kolkata - 450+ Call Girl Cash Payment 800...Nagerbazar @ Independent Call Girls Kolkata - 450+ Call Girl Cash Payment 800...
Nagerbazar @ Independent Call Girls Kolkata - 450+ Call Girl Cash Payment 800...
HyderabadDolls
 

Dernier (20)

Scaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processScaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP process
 
The NAP process & South-South peer learning
The NAP process & South-South peer learningThe NAP process & South-South peer learning
The NAP process & South-South peer learning
 
Competitive Advantage slide deck___.pptx
Competitive Advantage slide deck___.pptxCompetitive Advantage slide deck___.pptx
Competitive Advantage slide deck___.pptx
 
Bhubaneswar Call Girls Bhubaneswar 👉👉 9777949614 Top Class Call Girl Service ...
Bhubaneswar Call Girls Bhubaneswar 👉👉 9777949614 Top Class Call Girl Service ...Bhubaneswar Call Girls Bhubaneswar 👉👉 9777949614 Top Class Call Girl Service ...
Bhubaneswar Call Girls Bhubaneswar 👉👉 9777949614 Top Class Call Girl Service ...
 
Lorain Road Business District Revitalization Plan Final Presentation
Lorain Road Business District Revitalization Plan Final PresentationLorain Road Business District Revitalization Plan Final Presentation
Lorain Road Business District Revitalization Plan Final Presentation
 
2024 UN Civil Society Conference in Support of the Summit of the Future.
2024 UN Civil Society Conference in Support of the Summit of the Future.2024 UN Civil Society Conference in Support of the Summit of the Future.
2024 UN Civil Society Conference in Support of the Summit of the Future.
 
tOld settlement register shouldnotaffect BTR
tOld settlement register shouldnotaffect BTRtOld settlement register shouldnotaffect BTR
tOld settlement register shouldnotaffect BTR
 
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
 
Pakistani Call girls in Sharjah 0505086370 Sharjah Call girls
Pakistani Call girls in Sharjah 0505086370 Sharjah Call girlsPakistani Call girls in Sharjah 0505086370 Sharjah Call girls
Pakistani Call girls in Sharjah 0505086370 Sharjah Call girls
 
Call Girls Koregaon Park - 8250092165 Our call girls are sure to provide you ...
Call Girls Koregaon Park - 8250092165 Our call girls are sure to provide you ...Call Girls Koregaon Park - 8250092165 Our call girls are sure to provide you ...
Call Girls Koregaon Park - 8250092165 Our call girls are sure to provide you ...
 
AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024
 
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
 
Call Girls Basheerbagh ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Basheerbagh ( 8250092165 ) Cheap rates call girls | Get low budgetCall Girls Basheerbagh ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Basheerbagh ( 8250092165 ) Cheap rates call girls | Get low budget
 
Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'
 
Delivery in 20 Mins Call Girls Malappuram { 9332606886 } VVIP NISHA Call Girl...
Delivery in 20 Mins Call Girls Malappuram { 9332606886 } VVIP NISHA Call Girl...Delivery in 20 Mins Call Girls Malappuram { 9332606886 } VVIP NISHA Call Girl...
Delivery in 20 Mins Call Girls Malappuram { 9332606886 } VVIP NISHA Call Girl...
 
Nagerbazar @ Independent Call Girls Kolkata - 450+ Call Girl Cash Payment 800...
Nagerbazar @ Independent Call Girls Kolkata - 450+ Call Girl Cash Payment 800...Nagerbazar @ Independent Call Girls Kolkata - 450+ Call Girl Cash Payment 800...
Nagerbazar @ Independent Call Girls Kolkata - 450+ Call Girl Cash Payment 800...
 
Genuine Call Girls in Salem 9332606886 HOT & SEXY Models beautiful and charm...
Genuine Call Girls in Salem  9332606886 HOT & SEXY Models beautiful and charm...Genuine Call Girls in Salem  9332606886 HOT & SEXY Models beautiful and charm...
Genuine Call Girls in Salem 9332606886 HOT & SEXY Models beautiful and charm...
 
Honasa Consumer Limited Impact Report 2024.pdf
Honasa Consumer Limited Impact Report 2024.pdfHonasa Consumer Limited Impact Report 2024.pdf
Honasa Consumer Limited Impact Report 2024.pdf
 
Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...
Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...
Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...
 
Vivek @ Cheap Call Girls In Kamla Nagar | Book 8448380779 Extreme Call Girls ...
Vivek @ Cheap Call Girls In Kamla Nagar | Book 8448380779 Extreme Call Girls ...Vivek @ Cheap Call Girls In Kamla Nagar | Book 8448380779 Extreme Call Girls ...
Vivek @ Cheap Call Girls In Kamla Nagar | Book 8448380779 Extreme Call Girls ...
 

Overcoming the cybersecurity challenges of smart cities

  • 1. Overcoming the Cybersecurity Challenges of Smart Cities Dr. Saeed Al Dhaheri Chairman, @DDSaeed Towards Dubai 2020 Smart City Conference, University of Dubai, 15th January 2017
  • 2. Overcoming the Cybersecurity Challenges of Smart Cities Agenda • Introduction: Cybersecurity threats • Cybersecurity landscape • Examples: threats and incidents • Smart City: what does it mean? • Security of Smart Cities: 3 main factors • Enabling Technologies for Smart Cities • Cybersecurity Challenges and Solutions • Cybersecurity Initiatives in UAE
  • 3. INTRODUCTION: CYBERSECURITY THREATS • Our society is now more vulnerable to cyber threats as we become more digitalized • Half a million cyber attack each minute – Fortnet report • The more connected IoT the more threats and risks • 6.8 Billion IoT in 2016 expected to reach 20 Billion by 2020 – Gartner • The more data recorded and stored in different locations the more threats • Every two days the world create more data than the history of human kind until 2003 • Cyber attacks are getting more frequent and complex ----< smart city echo systems becomes more vulnerable • Increasing global trend to implement smart city initiatives • More than 1000 smart city initiative by 2025 Can we maintain privacy and security of smart city? Risks not only restricted to Loss, theft, and financial but touches Lives of people
  • 4. CYBERSECURITY LANDSCAPE IS GETTING COMPLEX • Organizational boundaries disappeared (anytime, anywhere, anyhow computing) • Hackers become more intelligent with the new smart tools –< more complex and intelligent attacks • Attacks exploit the weakest link in the value chain • More advanced tools for discovery and protection • Intelligent worms targeting IoT devices (wearables ,smart watches,,,etc) • Jail breaking the clouds and VMs • Ghostware to conceal attacks • Blastware destroys or disable when detected • Ransomware Video Cameras are a leading source of DDoS attacks
  • 5. EXAMPLES: THREATS • Possible threats: • Hacking into Energy plants and manufacturing systems • Hacking medical devices (pacemakers,,,etc) • Hacking autonomous driving cars, or traffic lights network • Hacking satellites • Hacking financial and banking systems • Hacking smart home systems • Hacking Drones Security & Risk management planning for smart cities becomes necessary
  • 6. EXAMPLES: CYBERSECURITY INCIDENTS DDoS attsck causes massive Internet outage in East Cost
  • 7. EXAMPLES: CYBERSECURITY INCIDENTS • Attack resulted in people using transportation for free • < 2000 devices were compromised “You Hacked, ALL Data Encrypted. Contact For Key(cryptom28@yandex.com)ID:681 , Enter”. Ransom of 100 Bitcoin ($70000) 27/11/2016
  • 8. SMART CITY: WHAT DOES IT MEAN? • “A smart sustainable city is an innovative city that uses information and communication technologies (ICTs) and other means to improve quality of life, efficiency of urban operation and services, and competitiveness, while ensuring that it meets the needs of present and future generations with respect to economic, social and environmental aspects”. • Key attributes: • Sustainability • Quality of life • “Smartness” or Intelligence Urban Dimensions People Living Governance Environment Mobility Economy ITU Definition
  • 9. SMART CITY: WHAT DOES IT MEAN?
  • 10. PREDICTIONS • 90% of cities in 2016 will lack comprehensive policies for Drones, sensors, and IoT –< increased cybersec risks - IDC smart city 2016 predictions • In 2017 at least one mid-size to large city will suffer a cyber attack that will impact its ability to effectively function for one day. IDC
  • 11. SECURITY OF SMART CITY: 3 FACTORS • Public Safety • Privacy • Technologies and ICT Security
  • 12. SMART CITY ENABLING TECHNOLOGIES IoT Cloud computing Smart and mobile devices Drones Artificial Intelligence Social Robotics Social Media Blockchain 3D Printing Big Data Analytics Renewable EnergyOpen Data All those technologies are subject to cybersecurity risks. Protection requires Cybersecurity strategy
  • 13. CYBERSECURITY CHALLENGES AND SOLUTIONS • Insecure IoT devices and insufficient testing • IoT devices easy to be hacked • No encryption for data or communication, and no access control standard • A study: < 200,000 traffic control devices in major cities around the world are vulnerable • IoT vendors don’t emphasize security or provide weak security • Solutions: • Strong security criteria and standards for IoT devices • Data encryption and traffic encryption between IoT and Data Centers • Securing stored data, and policies • Conduct penetration testing after installation • Choose reputed vendors who offers strong security
  • 14. CYBERSECURITY CHALLENGES AND SOLUTIONS • No clear structure and governance for cybersecurity in the smart city initiative • No clear leadership • No Security Operations Center SOC • No Smart City Risk management plan • Solutions: • Clear cybersecurity leadership and structure • Example: Dubai electronic security center • Appoint Chief Information Security Officer on a city level • Clear roles and responsibilities for all concerned parties • Risk management plan • More collaboration between stakeholders are needs
  • 15. CYBERSECURITY CHALLENGES AND SOLUTIONS • Skill shortage in cybersecurity • Solutions: • Determine needs and coordinate with universities and training centers • Encourage UAE locals to study Cybersecurity and provide scholarships • Continue investing on training existing resources • Provide incentives in the public and private sectors
  • 16. CYBERSECURITY CHALLENGES AND SOLUTIONS • Lack or insufficient legal framework and regulations • Solutions: • Review and amendment of the laws and regulations • UAE law no 5 for 2012 for e-crimes • International collaboration is required • Training law enforcement and judicial staff to deal with cyber crimes
  • 17. CHALLENGES AND SOLUTIONS • Lack of Cybersecurity awareness among customers and employees • Solutions: • More Awareness campaigns • Inside gov organizations for staff • For customers • Cooperation between law enforcement and citizens Salim aeCERT initiative
  • 18. CYBERSECURITY CHALLENGES AND SOLUTIONS • Budget problem • Solutions: • Need leadership awareness about importance of cybersecurity • Partnership programs through PPP to execute Smart city initiatives
  • 19. UAE CYBERSECURITY INITIATIVES • On the Federal level • National Electronic Security Authority – NESA • Computer Emergency Response Team – AE CERT • On the local level • Dubai Electronic Security Center • Abu Dhabi Systems & Information Center – ADSIC • On the private level • Smartworld Cybersecurity Center • Dark Matter
  • 20. DUBAI ELECTRONIC SECURITY CENTER • To secure the government network and information systems, and develop Dubai Info sec policy and supervise its implementation • Counter act the cybercrimes • Develop Dubai cyber security strategy • Focus on innovation in cybersecurity and spreading awareness
  • 21. OVERVIEW OF SMARTWORLD Smartworld and The Kernel joined hands to build the first cybersecurity center in the ME region, which will train UAE nationals in cyber security and provide round-the-clock advanced security monitoring along with cyber threat management to government and private sector companies in the UAE. Training Services Focused on Cybersecurity in Software, Networks, and Social Engineering. Exclusive Training Programs designed by The Kernel and Smartworld. International Certification Programs (ISC2, ISACA, SANS). Vendor Product Training. Security Auditing and Reporting. Penetration testing, attack simulation, controlled DDoS testing. Consultation and Security Solution Design Assess Verify Protect WebConvot WAF Web Application Firewall Yubikey Multi-factor authenticator WebPurifier UTM Unified Threat Management Elcomesoft Recovery and analysis suite Oxygen Mobile forensics toolkit EgoSecure Endpoint Security Products
  • 22. SECURING SMART CITIES INITIATIVE • Global non–profit initiative to find solutions to overcome smart cities cybersecurity challenges • Focus on cooperation between cities, companies, and governments and int orgs and individuals • Guidelines about Info sec for Smart cities • Provide a repository of research papers
  • 23. End