Ensuring cybersecurity for smart cities is crucial for a sustainable cyber ecosystem. Given the undeniable complexity of smart cities, fundamental issues such as device configurations and software updates should be addressed when it is most needed to fight cyber-crime and ensure data privacy. This b
Cybersecurity for Smart Cities: Practices and Challenges
✍ Scribed by Mohiuddin Ahmed, Paul Haskell-Dowland
- Publisher
- Springer
- Year
- 2023
- Tongue
- English
- Leaves
- 210
- Series
- Advanced Sciences and Technologies for Security Applications
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
Ensuring cybersecurity for smart cities is crucial for a sustainable cyber ecosystem. Given the undeniable complexity of smart cities, fundamental issues such as device configurations and software updates should be addressed when it is most needed to fight cyber-crime and ensure data privacy.
This book addresses the cybersecurity challenges associated with smart cities, aiming to provide a bigger picture of the concepts, intelligent techniques, practices and research directions in this area. Furthermore, this book serves as a single source of reference for acquiring knowledge on the technology, processes and people involved in the next-generation of cyber-smart cities.
✦ Table of Contents
Preface
Acknowledgements
Contents
Investigation on the Infusion of Cybersecurity and Smart City
1 Introduction
2 Smart City
3 Opportunities of a Smart City
4 The Prominent Characteristics of a Smart City
5 Applications of a Smart City
5.1 Smart Healthcare System
5.2 Smart Energy System
5.3 Smart Transportation System
5.4 Smart Parking System (SPS)
5.5 Smart Waste Management System
5.6 Several Other Related Applications of Smart City
6 Cybersecurity and Smart City
7 Various Cases and Risks of Cybersecurity
8 Types of Cyber-Attacks
9 Conclusions
References
Cyberbullying Instilled in Social Media
1 Introduction
2 Cyberbullying
3 Upsurge in Cyberbullying
4 Who Are These Bullies and What Causes Them to Get into Cyberbullying?
5 Impact of Cyberbullying
6 Machine Learning
6.1 Types of Machine Learning
6.2 Uses and Impacts of Machine Learning
6.3 Utilization of Machine Learning in Combating Cyberbullying
7 Conclusion
References
Pivoting Human Resource Policy Around Emerging Invasive and Non-invasive Neurotechnology
1 Pivoting Human Resource Policy and Workplace Neurotechnology
1.1 Enhanced Alertness
1.2 Memory Enhancement
1.3 Deception Detection
1.4 Insider Threats, Espionage and Law Enforcement
2 Cybernetic Rights in a Cyber Smart City
2.1 Mental Privacy
2.2 Personal Identity
2.3 Free Will
2.4 Fair Access to Mental Augmentation (FAMA)
2.5 Algorithmic Bias Protection
2.6 Responsible Cybernetic Innovation
2.7 Authoritative Safety Assessments
2.8 Inclusivity
2.9 Multidisciplinary Development
2.10 Societal Deliberation
2.11 Authoritative Oversight
2.12 Biophysical Data Security
2.13 Stewardship
2.14 Anticipation of Unintended Uses
2.15 Ethical Case Study: BrainCo
References
Privacy and Ethics in a Smart City: Towards Attaining Digital Sovereignty
1 Introduction
2 Privacy and Ethics: An Avalanche of Challenges
2.1 Why Is It Challenging?
2.2 Is This a Big Deal? If so, Why?
3 Privacy
4 Ethics
4.1 Ethical Consideration for the Contact Tracing Apps
4.2 Ethical Dilemma for the Decision Support Systems
5 Taking Refuge Behind the Regulatory Principles
5.1 Inspirations from the Existing Regulatory Framework
5.2 Is This Enough?
6 Towards Digital Sovereignty
7 Conclusion
References
Knowledge Organization Systems to Support Cyber-Resilience in Medical Smart Home Environments
1 Introduction
2 Related Work
3 Common Cyberattack Types in Medical Smart Homes
3.1 Cyberattacks on Medical Devices
3.2 Cyberattacks in Hospitals
3.3 Cyberattacks in Aged Care Facilities
4 The Role of Legislation and Standards for Cyber-Resilience in Medical Smart Homes
5 Knowledge Organization Systems for Cyber–Resilience in Medical Smart Home Environments
6 Information Security Countermeasures in Medical Smart Homes
7 Summary
References
Cybersafe Capabilities and Utilities for Smart Cities
1 Introduction
2 Architecture of a Smart City
3 Cyber Security Aspect of a Smart City
4 Cybersafe Capabilities of a Smart City
4.1 Secure Boot and Firmware Integrity
4.2 Security Monitoring, Analysis, and Response
4.3 Secure, Mutual Authentication
4.4 Security Lifecycle Management
4.5 Updating and Patching
5 Cybersafe Utilities for Securing Smart Cities
5.1 Intrusion Detection System (IDS) and Intrusion Prevention Systems (IPS)
5.2 Honeypots
5.3 Demilitarized Zone (DMZ)
5.4 Firewalls
6 Future Directions
7 Conclusions
References
Untitled
Cyber Safe Data Repositories
1 Introduction
2 Data Repositories
2.1 Data Warehouse
2.2 Data Mart
2.3 Data Cube
2.4 Data Lake
3 Are Data Repositories Vulnerable?
3.1 Database SQL Injection Attacks
3.2 Accessible Backups
3.3 Inadequate Permissions Management
3.4 Hidden Database Servers
3.5 Exploitable Database Vulnerabilities
3.6 Human Error
3.7 Buffer Overflow Attacks
3.8 Malware
3.9 DDoS/DoS Attacks
3.10 Fake Data
3.11 Data Poisoning
3.12 Data Privacy
4 Improving Data Security
4.1 Testing Security
4.2 Strong Passwords
4.3 Protect the Data Itself
4.4 Updating Programs Regularly
4.5 Encrypting All Devices, Files, and Backups
4.6 Accounts and Privileges
4.7 Creating Company-Wide Security
4.8 Physical Database Security
4.9 Insider Threats
4.10 Time and Money for Cyber Security
4.11 Deleting Redundant Data
4.12 Backup Data Regularly
4.13 Disabling Public Network Access
4.14 Patching Database Servers
4.15 Real-Time Database Monitoring
4.16 Web Application and Database Firewalls
4.17 Database Auditing
4.18 Vulnerability Assessments and Penetration Tests
5 Conclusion
References
Misinformation Detection in Cyber Smart Cities
1 Introduction
2 Misinformation
2.1 Definition and Classification of Misinformation
3 Impact of Misinformation in a Smart City Context
3.1 Impact on Cyber Security
3.2 Influence on Health System
4 Misinformation Detection Techniques
4.1 Misinformation Detection in Cyber-Physical System
4.2 Misinformation Detection by Natural Language Processing
4.3 Multi Modal Misinformation Detection in Cyber Digital Platform
5 Conclusion
References
Vehicle Trajectory Obfuscation and Detection
1 Introduction
2 Related Works
3 Proposed Scheme
3.1 System Model
3.2 Dynamic Obfuscation Scheme
3.3 Adaptive Location Privacy-Preserving Scheme
3.4 Illegal Trajectories Detection Based on CNN
4 Evaluation
4.1 Original Dataset
4.2 Illegal Trajectories
4.3 Simulation Results
4.4 Contrast
5 Conclusions
References
The Contribution of Deep Learning for Future Smart Cities
1 Smart City
1.1 Categories of Smart City
1.2 Components of Smart City
2 Deep Learning
2.1 Neural Networks
2.2 The Contribution of Deep Learning in Smart City
3 Application of Deep Learning in Smart City
3.1 Smart City Applications for Security and Safety
3.2 Traffic Monitoring Using Deep Learning in Smart City
3.3 Measures for a Smart City to Prevent the COVID-19 Pandemic
3.4 Measurements of Air Quality
4 Future Opportunities
5 Conclusion
References
An EDGE Supported Ambulance Management System for Smart Cities
1 Introduction
2 Related Works
2.1 Edge Computing in Healthcare
2.2 Blockchain in Healthcare
2.3 Motivations
3 System Structure
3.1 Participants of the System
3.2 Transactions
3.3 Working Procedure
4 Implementation
5 Performance Analysis
5.1 Performance of Blockchain Based System
5.2 Performance of Data Transmission
5.3 Security Services
6 Conclusion
References
Cryptocurrency: Is it the Future of Payments?
1 Introduction
1.1 Chapter Roadmap
2 Government Recognition
3 Major Concerns
3.1 Frauds and Scams
3.2 Scalability Concerns
3.3 Energy Concerns
4 Cryptocurrency Competition
4.1 Altcoins
5 Advantages of Cryptocurrency
5.1 Direct Trading
6 Processing of Cryptocurrency
6.1 Signatures
6.2 Proof of Work
6.3 Proof-of-Stake
6.4 Hashcash
6.5 Security
7 Conclusions
References
Ransomware: A Threat to Cyber Smart Cities
1 Introduction
2 Key Industries
2.1 Healthcare
2.2 Government
2.3 Industrial
2.4 Financial
3 Prevention and Mitigation
3.1 Technical Controls
3.2 Organizational Control
4 Conclusions
References
📜 SIMILAR VOLUMES
<p><i>Smart Cities Cybersecurity and Privacy</i> examines the latest research developments and their outcomes for safe, secure, and trusting smart cities residents. </p> <p>Smart cities improve the quality of life of citizens in their energy and water usage, healthcare, environmental impact, transpo
<p><i>Electric Vehicles for Smart Cities: Trends, Challenges, and Opportunities</i> uniquely examines different approaches to electric vehicle deployment in the context of smart cities. It provides a holistic picture of electromobility within urban areas, offering an integrated approach to city tran
<p><p></p><p>This book provides a concise overview of the current state of the art in cybersecurity and shares novel and exciting ideas and techniques, along with specific cases demonstrating their practical application. It gathers contributions by both academic and industrial researchers, covering
This book provides a concise overview of the current state of the art in cybersecurity and shares novel and exciting ideas and techniques, along with specific cases demonstrating their practical application. It gathers contributions by both academic and industrial researchers, covering all aspects o
<p><span>This book covers the topics on cyber security in IoT systems used in different verticals such as agriculture, health, homes, transportation within the context of smart cities. The authors provide an analysis of the importance of developing smart cities by incorporating technologies such as