Smart Cities: Securing Public Services
BT looks at why the public sector shouldn’t see data security management of Smart Cities as an obstacle to innovation and progress
With the rise of ‘Smart Cities’ and the vast amounts of data they require, it is no surprise that public sector organisations can feel overwhelmed by security concerns, without fully understanding the benefits of this infrastructure in developing cities.
Prior to the smart city concept, there was generally only a limited set of data within a council that required strong security to be in place, for example around benefit or health records.
Now that smart cities have the dual capability of utilising the Internet of Things (IoT), the potential application within the public sector means that there is a wider range of data sets which can be used to improve functionality in a chosen city. Within this, comes the element of ensuring IoT adapted security systems are in place to prevent any potential data breaches.
BT has worked closely with multi award-winning MK:Smart, one of the UK’s most recent examples of an energy efficient smart city. Smart cities improve the monitoring of energy, water, waste management and more. Through this, Milton Keynes has the potential to improve lives and conserve resources but equally it has had to look at the security challenges that come with these changes.
BT was the lead technology partner in the MK:Smart project. It featured BT’s information hub, developed with the Open University and Milton Keynes Council. The hub gathers vast amounts of real-time information from all kinds of different sensors in the city. The data is being used to build smarter, innovative new transport and energy applications.
Part of the BT assessment of the smart city, involved evaluating the risk surrounding data breaches. There are security risks to the growing role of technology in tasks such as monitoring water and air quality. By embedding common sense security practices from the outset, the risks of securing smart cities can be mitigated.
Traditionally, a data-security assessment will reveal that a local authority re-quires commercial good practice. The UK government's National Technical Authority for Information Assurance (CESG) is a good resource for the public sector to ensure necessary security checks are in place.
A security assessment of this kind can help local authorities to establish how to manage their data-security requirements. The process ensures an organisation’s security measures and resources are proportionate to the amount of risk that exists, and are invested in the correct places.
At a more forensic level, organisations can benefit from a cyber maturity assessment in which BT can evaluate the infrastructure of an organisation’s network and IT estate, find any shortfalls or vulnerabilities and identify solutions. This can then be built into assessments of IoT solutions and help to run a successful smart city for future generations to benefit from.
Foundations for a successful smart city:
- Smart cities require a reassessment of security practices
- Smart cities and IoT mean there is more data that could be exposed however with the correct infrastructure, this does not need to be a concern
- By following correct procedures with an experienced network provider you can properly protect services
- Embed IoT into these proper procedures
Island’s local authority recruits for a range of leaders to fulfil transformation plan
Chief technology officer Ben Denison discusses how the organisation is using technology to get on top of increasingly vast and complex cases of bribery, fraud, and corruption
New section on measuring benefits on agile projects added to document that helps government create services that comply with GDS standards
Civil servant Zara McDermott has joined the ITV reality show
The cautionary tale of the Leicestershire teenager who hacked high-ranking officials of NATO allies shows the need for improved password security
Which? said a lack of knowledge about data among consumers had led to suspicion and doubt over useful innovations
Calm has turned a section of the 57,509-word EU document into a sleep-inducing audio book
BT's Konstantinos Karagiannis explains ethical hacking and why it's important to exploit vulnerabilities