Skip to main content

Cyber Defense in the Age of the Smart City

  • Chapter
  • First Online:
Smart Cities of Today and Tomorrow

Abstract

The number one problem in trying to create effective cyber defense systems for the next decade will most likely come from looking through a rearview mirror to anticipate problems. Cambridge Analytics, which “appropriated” the personality profiles of 50 million users of Facebook and then bombarded them with a view of “news” distorted to conform with their political views, is just one example of a cybersecurity problem that has emerged from the research on the latest U. S. presidential election. Each new edition of industrial controls, machine-generated commands to control automated infrastructure and artificially intelligent algorithm will reveal a new type of cyber weakness that urban planners must contend with and hopefully solve.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 19.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 29.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Ian Bogost “One of the Biggest and Most Boring Cyberattacks Against an American City Yet” The Atlantic Mar 28, 2018 https://www.theatlantic.com/technology/archive/2018/03/atlantas-boring-ransomware-attack/556673/.

  2. 2.

    Ibid.

  3. 3.

    “IoT in Defense White Paper,” Wind River, http://www.windriver.com/whitepapers/iot-for-defense/wind-river_%20IoT-in-Defense_white-paper.pdf. (Last accessed June 6, 2016.)

  4. 4.

    The Internet of Things for Defense: A White Paper, Wind – An Intel Company, October 2015. http://www.windriver.com/whitepapers/iot-for-defense/wind-river_%20IoT-in-Defense_white-paper.pdf.

  5. 5.

    Ibid.

  6. 6.

    William Jackson, “Einstein 3 goes live with automated malware blocking” GNC, July 24, 2013 blocking https://gcn.com/articles/2013/07/24/einstein-3-automated-malware-blocking.aspx.

  7. 7.

    “Wireless B vs G vs N vs AC | What Is the Difference?” http://homenetworkadmin.com/wireless-b-vs-g-vs-n-vs-ac-difference/ (Last accessed Nov. 14, 2017).

  8. 8.

    Rachel Weiner, “Romanians Charged with Hacking,” Washington Post, p. B5.

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Pelton, J.N., Singh, I.B. (2019). Cyber Defense in the Age of the Smart City. In: Smart Cities of Today and Tomorrow. Copernicus, Cham. https://doi.org/10.1007/978-3-319-95822-4_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-95822-4_4

  • Published:

  • Publisher Name: Copernicus, Cham

  • Print ISBN: 978-3-319-95821-7

  • Online ISBN: 978-3-319-95822-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics