Connect with us

Featured

Smart cities must prepare for cyber war

Published

on

IoT and Smart Cities have become terms we are all too familiar with, but looking at the rate at which they grows, we cannot ignore the growth of the attack areas, writes PAUL WILLIAMS, Country Manager SADC, Fortinet.

Smart cities are being planned the world over. Technology development always goes through two phases for any new discipline: First – tools are developed, and infrastructure is built and enabled. And second – the technology is scaled up. In the case of smart cities, we are in the first phase, where many of the kinks and challenges are still being ironed out.

Here are some examples of services a smart city might provide:

·         Coordinated energy control of air conditioners at homes during hot summer days to manage and preserve city power resources

·         Directed local discounts in retail and restaurants to avoid city congestion

·         An automatic fee for driving a vehicle during highly congested periods

·         A smart directed parking app that automatically discounts congestion charges for parking in specific parking lots

·         Real-time sensor data to warn citizens affected by allergens and irritants

·         Real-time sensor data of standing water for mosquito breeding, etc.

·         Vehicle-to-vehicle communication, autonomous driving technology, and infrastructure with embedded sensors to warn of things like imminent traffic jams, construction, best routes for navigation during emergencies, etc. based on real-time traffic patterns.

To enable such services, smart cities will need to deploy plenty of IoT devices and services for metering, sensing, and controlling.

The Attack Surface of Smart Cities

The increase in the size of a smart city’s IoT device footprint corresponds to an increase in the size of its attack surface.

As was seen recently in a series of IoT-based denial of service attacks, IoT devices can be compromised and hijacked into a Shadownet (an IoT-based botnet that can’t be seen or tracked using normal browsers or tools) and controlled by a command and control (C&C) center run by hackers. Alternatively, these devices and services may be attacked in order to deny services to legitimate users.

Here are some examples of what hackers and attackers can do:

·         Take control of parking, traffic lights, signage, street lighting, and automated bus stops, etc. For example, changing highway signs to read “terrorist threat in area” or “danger, toxic spill ahead” could seriously disrupt traffic and cause panic among drivers.

·         Direct all cars and buses to a specific area to create congestion and gridlock.

·         Disable local transportation, thereby disrupting businesses and services, such as banking, because employees can’t get to work.

·         Open causeways to spill sewage and untreated waste water into parks, rivers, and communities.

·         Cut off access to drinking water.

·         Send fake SMS directing to people to a specific location, such as a targeted business or government agency

·         Remotely switching off air conditioners or furnaces during extreme temperature days

·         Randomly turning on fire and burglar alarms throughout the city

Increasing the Security in Smart Cities from the Inside

While it’s not possible to secure every possible security breach in a totally connected environment, it doesn’t mean we need to go back to the Stone Age. Instead, it’s possible to take some key initial steps to strengthen the smart city’s security posture and architecture:

·         Use strong encryption

·         Design systems that have strong protection against tampering.

·         Provide strong access control, authentication, and authorization

·         Maintain detailed logging of activities

·         Segment services for individual sub-systems, and then aggregate and pool data that you want to make publicly accessible

·         Create centralized management, analysis, and control systems through segmented and secured administration channels to troubleshoot problems

·         Set baseline standards that trigger alarms or require manual override when thresholds are crossed or anomalous behavior is detected, such as rerouting traffic or disabling water treatment.

Segmentation is the Key

With a complex smart city network, segmentation is the key. For example, the Smart Transportation network needs to be logically segmented from other smart networks, such as user services, websites, or energy networks, etc. This aids in isolating an attacks, and allows for the advanced detection of data and threats as attacks and malware move from one network zone to the other. This also divides the smart city network into security zones, which aids in compliance, monitoring internal traffic and devices, and preventing unauthorized access to restricted data and resources.

Such segmentation will ensure that the majority of the IoT components deployed across the smart city only communicate with those devices and systems they should, and only talk in the protocols they have been assigned. This will also ensure that the interior network doesn’t get hacked and can’t participate in a DDoS attack.

In a similar way, other smart networks in the city can be segmented and isolated from each other, thereby avoiding the spread of malware and reducing the impact of any hacks and attacks. Further, smart cities must make include the ability of IoT equipment to support and control such traffic an essential purchasing requirement.

Increasing the Security in Smart Cities from the Outside: DDoS Attacks

While network segmentation will ensure that the internal network is protected and its integrity and availability are preserved, we need to increase the availability of the smart city’s Internet facing properties. DDoS attacks can be easily used to overwhelm this infrastructure. Depending on the size of the pipe, and expected worst-case scenarios, city IT teams must develop and implement and effective DDoS attack mitigation strategy. This may be comprised of either an over provisioned appliance solution, or a hybrid solution consisting of appliances combined with a cloud based scrubbing center.

An over provisioned appliance solution enables you to manage DDoS attacks that are larger than your normal bandwidth usage. For example, if your normal user traffic is 1 Gbps, develop a plan for a 20 Gbps DDoS attack that includes deploying an appliance to mitigate such attacks, and provision for such potential bandwidth requirements from your service provider. If the actual attack is expected to be larger than your service provider bandwidth, however, you may need a hybrid solution that includes a cloud-based scrubber that works closely with your DDoS appliance solution.

From Smart to Smarter

As time passes, smart cities will become even smarter as they learn from researchers, from each other, and from incidents that are bound to happen.

Featured

AppDate: DStv jumps on music bandwagon

In this week’s AppDate, SEAN BACHER highlights DStv’s JOOX, Cisco’s Security Connector, Diski Skills, Namola and Exhibid.

Published

on

DStv JOOX

DStv is now offering JOOX, a music streaming service owned by China’s Tencent, to DStv Premium, Compact Plus and Compact customers.

In addition to streaming local and international artists, JOOX allows one to switch to karaoke mode and learn the lyrics as well as create and share playlists. Users can add up to four friends or family to the service free of charge.

DStv Family, Access and EasyView customers can also log in to the free JOOX service directly through JOOX App, but will be unable to add additional friends and won’t be able to listen to add-free music.

Platform: Access the JOOX service directly from the services menu on DStv or download the JOOX app for an iOS or Android phone.

Expect to pay: A free download.

Stockists: Visit the store linked to your device.

 

Cisco Security Connector

With all the malware, viruses and trojans doing the rounds, it is difficult for users and enterprises to ensure that they don’t become targets. Cisco, in collaboration with Apple, has brought out its Cisco Security Connector to protect users. The app is designed to give enterprises and users overall visibility and control over their network activity on iOS devices. It does this by ensuring compliance of mobile users and their enterprise-owned iOS devices during incident investigations, by identifying what happened, who it affected, and the risk of the exposure. It also protects iPhone and iPad users from accessing malicious sites on the Internet, whether on the corporate network, public Wi-Fi, or cellular networks. In turn, it prevents any viruses from entering a company’s network.

Platform: iPhones and iPads running iOS 11.3 or later

Expect to pay: A free download

Stockists: Visit the Apple App Store for downloading instructions.

 

Diski Skills

The Goethe-Institut, in co-operation with augmented reality specialists Something Else Design Agency, has created a new card game which celebrates South African freestyle football culture, and brings it alive through augmented reality. Diski Skills is quick card game, set in a South African street football scenario, showing popular tricks such as the Shibobo, Tsamaya or Scara Turn. Each trick is rated in categories of attack, defence and swag – one wins the game by challenging an opponent strategically with the trick at hand. Through augmented reality, the cards come alive. Move a smartphone over a card and watch as the trick appears on the screen in a slow motion video. An educational value is added as players can study the tricks and learn more about the idea behind it.

 

The game will be launched on 27 October 2018 at the Goethe-Institut.

For more information visit: www.goethe.de

 

Namola

With  recent news of kidnappings on the rise, a lot more thought is going into keeping children safe. Would your child know what to do in an emergency? Have you actually asked them?

Namola, supported by Dialdirect Insurance, is a free mobile safety app. Namola’s simple interface makes it an ideal way for children to learn how to get help in an emergency. All they need to do is activate the app and push a button to get help that they need, even when their parents are not around.

Parents need to install the app on their child’s phone, hold down the request assistance button, program emergency numbers that will automatically be dialled when the emergency button is pushed, and teach their children how and when to use the app.

Platform: Android and iOS

Expect to pay: A free download.

Stockists: Visit the store linked to your device.

 

Exhibid

Exhibid could be thought of as Tinder, but for for art lovers. The interface looks very similar to the popular mobile dating app, in that users swipe left for a painting that doesn’t appeal to them, or swipe right for something they like. Once an art piece is liked by swiping right, one can start bidding or make an offer on it. The bid is automatically sent to the artist. Should he or she accept the offer, the buyer makes a payment through the app’s secure payment gateway and the two are put in contact to make arrangements for delivery.

Platform: Android and iOS

Expect to pay: A free download.

Stockists: Visit the store linked to your device.

Continue Reading

Featured

New kind of business school

At a recent meeting, ALLON RAIZ, founder and CEO of Raizcorp, realised that in order for today’s youth to become entrepreneurs, teachers, the curriculum and the parents need continually expose them to entrepreneurial thinking from a young age.

Published

on

Several years ago, I found myself in a meeting with my business partner and two of my staff members. In front of us was a client who was sharing some of the frustrations in his business. At the end of the meeting, my partner and I were extremely excited about the prospect of two massive opportunities we had both independently identified while listening to the client. My two staff members, on the other hand, completely missed them. This led me to wonder what it was in my own and my partner’s backgrounds that allowed us to so easily spot opportunities while my two staff members remained oblivious … I realised that the difference was that my partner and I both had an early exposure to entrepreneurship while they didn’t.

Not long afterwards, I was delivering a lecture about how Raizcorp grows and develops small businesses at Oxford University’s Said Business School in my role as their Entrepreneur-in-Residence. I mentioned the above incident and spoke about my intention of going into children’s education with a view to providing an entrepreneurial perspective.

One of the professors in attendance asked me if I’d ever heard of a piece of research by Henrich R Greve called Who wants to be an entrepreneur? The deviant roots of entrepreneurship. It’s a pretty unfortunate title but a fascinating piece of research nonetheless. It highlights how certain contexts in childhood result in a much a higher probability of becoming an entrepreneur. For example, kids who participate in solo sports such as tennis or athletics are more likely to become entrepreneurs than children who play team sports like soccer and cricket. Conversely, your mother’s participation in the parent-teacher association has a negative correlation to you becoming an entrepreneur. I spent the rest of the afternoon in the professor’s office discussing other research papers that unequivocally proved that context during your childhood has a massive influence on whether or not you will follow the entrepreneurial route.

Another member of the lecture audience was a double-PhD from the USA who was completing her MBA at Oxford. After the lecture, she approached me and volunteered to help build a framework to incorporate entrepreneurship in the school curriculum without interfering with the formal requirements of the CAPS curriculum.

She spent nine months in South Africa working with me to build out a practical framework. The next phase of the plan was to find the right school at which to embark upon this journey. In December 2015, Raizcorp purchased Radley Private School and we began our entrepreneurial education adventure in earnest in 2016.

At the centre of the Radley philosophy is that the school (the physical building), the teachers, the curriculum and the parents are the “marinade” in which the kids need to soak in order to be continuously exposed to entrepreneurial thinking from a young age. The aim was that if, in future, the kids found themselves sitting in a boardroom with me and my partner, they too would be able to identify the opportunities that we did.

A big shift this year has been the launch of our Entrepreneurial Educator Guide (EEG) programme where we have been training our Radley teachers (whom we call guides) to understand entrepreneurship, business language, business concepts, financial documents and the like. (The EEG training makes use of Raizcorp’s internationally accredited entrepreneurial learning and guiding methodologies.) We have also employed a full-time staff member to ensure that these concepts are imbedded into all lesson plans and classroom activities.

Through my network at Raizcorp, I have been pleasantly surprised by the massive support we’re receiving from prominent entrepreneurs and businesses who want to participate in our Radley Exposure programme, where we take our kids of all ages on visits to different types of businesses so they can understand the difference between retail, wholesale, manufacturing, logistics and so on. Prominent businesspeople have put up their hands to come to the school and tell their stories of hard work, resilience and perseverance. This ties in beautifully with the 17 entrepreneurial concepts that we are instilling into our Radley learners (such as opposite eyes, lateral thinking and opposable mind), while never compromising on our quality academic offering.

As parents, we’ve all heard the terrible statistics about the probability of our kids finding jobs in the future. At Radley, we’re working hard to ensure that our kids have a legitimate and lucrative alternative to finding traditional employment and that is to become an entrepreneur. Radley is all about producing job creators and not job seekers!

To enrol your child or find out more about the school, please visit www.radley.co.za.

Continue Reading

Trending

Copyright © 2018 World Wide Worx