SlideShare a Scribd company logo
9 Desember 2018
STMIK Insan Pembangunan
Tangerang, Banten
Charles Lim, Msc., CTIA, CHFI, EDRP, ECSA, ECSP, ECIH, CEH, CEI
Cyber Security Challenges in
Smart City
Master of Information Technology
AGENDA
Why Smart City
How smart is our city?
Security Challenges
Operational Technology & Smart City
Smart City & Cyber Security
Smart Steps to Smart City
Questions and Anwers
2
Master of Information Technology
Smart City
Master of Information Technology
Smart City
The Smart City can be defined as the
integration of data and digital technologies
into a strategic approach to sustainability,
citizen well-being and economic development.
— National Institute Standard and Technology (NIST)
Master of Information Technology
Why Smart City
https://www.urenio.org/2013/11/04/idc-white-paper-smart-cities-internet-things/
Master of Information Technology
Complexity of Smart City
6
Master of Information Technology
Tangerang Live
7
Master of Information Technology
Smart Waste Management
8
Master of Information Technology
Internet of Things Landscape
9
Master of Information Technology
Smart City Ecosystem Framework
https://www.iotforall.com/smart-city-ecosystem-framework-model-for-planning-smart-
cities/
Master of Information Technology
Security Challenges
Master of Information Technology
Security Challenges
Insecure Hardware
Larger Attack Surface
Bandwidth Consumption
Application Risk
12
Master of Information Technology
Data Exchange in Smart City
Master of Information Technology
Operational Technology & IT
Master of Information Technology
Operational Technology (OT) & IT
http://blog.lnsresearch.com/5-mistakes-companies-make-when-defining-an-operational-
architecture/
Master of Information Technology
Operational Technology (OT) & IT
https://www.frontiercomputercorp.com/frontierus/industrial-iot//
Master of Information Technology
Operational Technology (OT) & IT
https://www.frontiercomputercorp.com/frontierus/industrial-iot//
Master of Information Technology
Smart City & OT
https://resources.esri.ca/spatial-data-infrastructure/the-emerging-role-of-gis-in-operational-technology-and-ot-
implementations
Master of Information Technology
Smart City & Cyber Security
Master of Information Technology
Irrigation System – HACKED !!!
https://cyber.bgu.ac.il/hackers-could-cause-havoc-by-pwning-internet-connected-irrigation-
systems/
Master of Information Technology
Internet of Things – HACKED !!!
Master of Information Technology
Smart City & Cyber Security
Master of Information Technology
Global Cyber Security Indexhttps://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2017-PDF-E.pdf
Master of Information Technology
Target: Critical Assets
 Critical Assets to be protected:
 Infrastructure
 Information System
 Data
24
Master of Information Technology
Smart Steps to Smart City
Master of Information Technology
Smart Steps
Start with Smart Policy
Protecting Private Information
Secure Information at the source
Standardize the need to know
Implement appropriate deterrents
26
https://www.pwc.com/us/en/services/consulting/cybersecurity/library/broader-
perspectives/smart-cities.html
Master of Information Technology
Law & Regulation
http://peraturan.go.id/rancangan-undang-undang-tentang-perlindungan-data-pribadi.html
 Key Issues:
 Law enforcement to protect private information
 Data Retention and Disposal
 BSSN or KOMINFO?
Master of Information Technology
Smart City   People
28
https://www.pwc.com/us/en/services/consulting/cybersecurity/library/broader-
perspectives/smart-cities.html
Right People
Right Time
Right Reason
Master of Information Technology
Questions
30

More Related Content

What's hot

Artificial intelligence in autonomous vehicle
Artificial intelligence in autonomous vehicleArtificial intelligence in autonomous vehicle
Artificial intelligence in autonomous vehicle
Gwenaël C
 
Introduction to Connected Cars and Autonomous Vehicles
Introduction to Connected Cars and Autonomous VehiclesIntroduction to Connected Cars and Autonomous Vehicles
Introduction to Connected Cars and Autonomous Vehicles
Bill Harpley
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
CAS
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
123seminarsonly
 
IoT Security
IoT SecurityIoT Security
IoT Security
Peter Waher
 
2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK
Boris Loukanov
 
Fidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception SolutionFidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception Solution
Fidelis Cybersecurity
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
TeachMission
 
Security-by-Design and -Default
 Security-by-Design and -Default Security-by-Design and -Default
Security-by-Design and -Default
Mehdi Mirakhorli
 
An AI accelerator ASIC architecture
An AI accelerator ASIC architectureAn AI accelerator ASIC architecture
An AI accelerator ASIC architecture
Khanh Le
 
Microsoft Azure and Security Certifications Transportation Map
Microsoft Azure and Security Certifications Transportation MapMicrosoft Azure and Security Certifications Transportation Map
Microsoft Azure and Security Certifications Transportation Map
Carlo Sacchi
 
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to Know
FireEye, Inc.
 
DRM Basics With Irdeto and Bitmovin
DRM Basics With Irdeto and BitmovinDRM Basics With Irdeto and Bitmovin
DRM Basics With Irdeto and Bitmovin
Bitmovin Inc
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
Hushen Savani
 
Mejores prácticas y las difíciles lecciones aprendidas con las aplicaciones S...
Mejores prácticas y las difíciles lecciones aprendidas con las aplicaciones S...Mejores prácticas y las difíciles lecciones aprendidas con las aplicaciones S...
Mejores prácticas y las difíciles lecciones aprendidas con las aplicaciones S...
Amazon Web Services LATAM
 
project-report-steganography.docx
project-report-steganography.docxproject-report-steganography.docx
project-report-steganography.docx
ssusere02009
 
Cyber Security Threat Modeling
Cyber Security Threat ModelingCyber Security Threat Modeling
Cyber Security Threat Modeling
Dr. Anish Cheriyan (PhD)
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
Kumar Gaurav
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Success
accenture
 

What's hot (20)

Artificial intelligence in autonomous vehicle
Artificial intelligence in autonomous vehicleArtificial intelligence in autonomous vehicle
Artificial intelligence in autonomous vehicle
 
Introduction to Connected Cars and Autonomous Vehicles
Introduction to Connected Cars and Autonomous VehiclesIntroduction to Connected Cars and Autonomous Vehicles
Introduction to Connected Cars and Autonomous Vehicles
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK
 
Fidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception SolutionFidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception Solution
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Security-by-Design and -Default
 Security-by-Design and -Default Security-by-Design and -Default
Security-by-Design and -Default
 
An AI accelerator ASIC architecture
An AI accelerator ASIC architectureAn AI accelerator ASIC architecture
An AI accelerator ASIC architecture
 
Microsoft Azure and Security Certifications Transportation Map
Microsoft Azure and Security Certifications Transportation MapMicrosoft Azure and Security Certifications Transportation Map
Microsoft Azure and Security Certifications Transportation Map
 
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to Know
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
DRM Basics With Irdeto and Bitmovin
DRM Basics With Irdeto and BitmovinDRM Basics With Irdeto and Bitmovin
DRM Basics With Irdeto and Bitmovin
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Mejores prácticas y las difíciles lecciones aprendidas con las aplicaciones S...
Mejores prácticas y las difíciles lecciones aprendidas con las aplicaciones S...Mejores prácticas y las difíciles lecciones aprendidas con las aplicaciones S...
Mejores prácticas y las difíciles lecciones aprendidas con las aplicaciones S...
 
project-report-steganography.docx
project-report-steganography.docxproject-report-steganography.docx
project-report-steganography.docx
 
Cyber Security Threat Modeling
Cyber Security Threat ModelingCyber Security Threat Modeling
Cyber Security Threat Modeling
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Success
 

Similar to Cyber Security challenges in SMART city

IoT and Big Data Analytics - the Philippines at the Crossroads
IoT and Big Data Analytics - the Philippines at the CrossroadsIoT and Big Data Analytics - the Philippines at the Crossroads
IoT and Big Data Analytics - the Philippines at the Crossroads
Erika Fille Legara
 
Sensing-as-a-Service - New Business Models for Internet of Things (IOT)
Sensing-as-a-Service - New Business Models for Internet of Things (IOT)Sensing-as-a-Service - New Business Models for Internet of Things (IOT)
Sensing-as-a-Service - New Business Models for Internet of Things (IOT)
Dr. Mazlan Abbas
 
IRJET- Smart City: Overview and Security Challenges
IRJET- Smart City: Overview and Security ChallengesIRJET- Smart City: Overview and Security Challenges
IRJET- Smart City: Overview and Security Challenges
IRJET Journal
 
Making a Better World with Technology Innovations
Making a Better World with Technology InnovationsMaking a Better World with Technology Innovations
Making a Better World with Technology Innovations
Imesh Gunaratne
 
Data Analytics for IoT - BrightTalk Webinar
Data Analytics for IoT - BrightTalk WebinarData Analytics for IoT - BrightTalk Webinar
Data Analytics for IoT - BrightTalk Webinar
Muralidhar Somisetty
 
IOT - The 3rd Internet Tsunami is Here
IOT - The 3rd Internet Tsunami is HereIOT - The 3rd Internet Tsunami is Here
IOT - The 3rd Internet Tsunami is Here
Dr. Mazlan Abbas
 
Big data, open data and telepathy : building better places to live, work and ...
Big data, open data and telepathy: building better places to live, work and ...Big data, open data and telepathy: building better places to live, work and ...
Big data, open data and telepathy : building better places to live, work and ...
Rick Robinson
 
Internet of Things - We Are at the Tip of an Iceberg
Internet of Things - We Are at the Tip of an IcebergInternet of Things - We Are at the Tip of an Iceberg
Internet of Things - We Are at the Tip of an Iceberg
Dr. Mazlan Abbas
 
4th Industrial Revolution - Riding the Waves
4th Industrial Revolution - Riding the Waves4th Industrial Revolution - Riding the Waves
4th Industrial Revolution - Riding the Waves
Dr. Mazlan Abbas
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
Anastasios Economides
 
KLW Student Advice Sharing
KLW Student Advice SharingKLW Student Advice Sharing
KLW Student Advice Sharing
monchai sopitka
 
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET-  	  Enhanced SIT Algorithm for Embedded SystemsIRJET-  	  Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET Journal
 
General Session-Neil El Himam (Direktur Aplikasi Dan Tata Kelola Ekonomi Digi...
General Session-Neil El Himam (Direktur Aplikasi Dan Tata Kelola Ekonomi Digi...General Session-Neil El Himam (Direktur Aplikasi Dan Tata Kelola Ekonomi Digi...
General Session-Neil El Himam (Direktur Aplikasi Dan Tata Kelola Ekonomi Digi...
DicodingEvent
 
How Singapore is Paving the Way for Global Smart Cities
How Singapore is Paving the Way for Global Smart CitiesHow Singapore is Paving the Way for Global Smart Cities
How Singapore is Paving the Way for Global Smart Cities
Solace
 
Moving Up or Down the IoT Value Chain
Moving Up or Down the IoT Value ChainMoving Up or Down the IoT Value Chain
Moving Up or Down the IoT Value Chain
Dr. Mazlan Abbas
 
April 2020 top read artilce in Computer Science and Information Technology
April 2020 top read artilce in  Computer Science and Information TechnologyApril 2020 top read artilce in  Computer Science and Information Technology
April 2020 top read artilce in Computer Science and Information Technology
AIRCC Publishing Corporation
 
Io t trends
Io t trendsIo t trends
Io t trends
Dr Ganesh Iyer
 
Your Journey Towards Industry 4.0 with Internet of Things
Your Journey Towards Industry 4.0 with Internet of ThingsYour Journey Towards Industry 4.0 with Internet of Things
Your Journey Towards Industry 4.0 with Internet of Things
Dr. Mazlan Abbas
 
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCOEl IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
Domotys
 
InfoRepos Academy Introduction v1.1 - IIOT Experiential Learning Program
InfoRepos Academy  Introduction v1.1 - IIOT Experiential Learning ProgramInfoRepos Academy  Introduction v1.1 - IIOT Experiential Learning Program
InfoRepos Academy Introduction v1.1 - IIOT Experiential Learning Program
InfoRepos Technologies
 

Similar to Cyber Security challenges in SMART city (20)

IoT and Big Data Analytics - the Philippines at the Crossroads
IoT and Big Data Analytics - the Philippines at the CrossroadsIoT and Big Data Analytics - the Philippines at the Crossroads
IoT and Big Data Analytics - the Philippines at the Crossroads
 
Sensing-as-a-Service - New Business Models for Internet of Things (IOT)
Sensing-as-a-Service - New Business Models for Internet of Things (IOT)Sensing-as-a-Service - New Business Models for Internet of Things (IOT)
Sensing-as-a-Service - New Business Models for Internet of Things (IOT)
 
IRJET- Smart City: Overview and Security Challenges
IRJET- Smart City: Overview and Security ChallengesIRJET- Smart City: Overview and Security Challenges
IRJET- Smart City: Overview and Security Challenges
 
Making a Better World with Technology Innovations
Making a Better World with Technology InnovationsMaking a Better World with Technology Innovations
Making a Better World with Technology Innovations
 
Data Analytics for IoT - BrightTalk Webinar
Data Analytics for IoT - BrightTalk WebinarData Analytics for IoT - BrightTalk Webinar
Data Analytics for IoT - BrightTalk Webinar
 
IOT - The 3rd Internet Tsunami is Here
IOT - The 3rd Internet Tsunami is HereIOT - The 3rd Internet Tsunami is Here
IOT - The 3rd Internet Tsunami is Here
 
Big data, open data and telepathy : building better places to live, work and ...
Big data, open data and telepathy: building better places to live, work and ...Big data, open data and telepathy: building better places to live, work and ...
Big data, open data and telepathy : building better places to live, work and ...
 
Internet of Things - We Are at the Tip of an Iceberg
Internet of Things - We Are at the Tip of an IcebergInternet of Things - We Are at the Tip of an Iceberg
Internet of Things - We Are at the Tip of an Iceberg
 
4th Industrial Revolution - Riding the Waves
4th Industrial Revolution - Riding the Waves4th Industrial Revolution - Riding the Waves
4th Industrial Revolution - Riding the Waves
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
KLW Student Advice Sharing
KLW Student Advice SharingKLW Student Advice Sharing
KLW Student Advice Sharing
 
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET-  	  Enhanced SIT Algorithm for Embedded SystemsIRJET-  	  Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded Systems
 
General Session-Neil El Himam (Direktur Aplikasi Dan Tata Kelola Ekonomi Digi...
General Session-Neil El Himam (Direktur Aplikasi Dan Tata Kelola Ekonomi Digi...General Session-Neil El Himam (Direktur Aplikasi Dan Tata Kelola Ekonomi Digi...
General Session-Neil El Himam (Direktur Aplikasi Dan Tata Kelola Ekonomi Digi...
 
How Singapore is Paving the Way for Global Smart Cities
How Singapore is Paving the Way for Global Smart CitiesHow Singapore is Paving the Way for Global Smart Cities
How Singapore is Paving the Way for Global Smart Cities
 
Moving Up or Down the IoT Value Chain
Moving Up or Down the IoT Value ChainMoving Up or Down the IoT Value Chain
Moving Up or Down the IoT Value Chain
 
April 2020 top read artilce in Computer Science and Information Technology
April 2020 top read artilce in  Computer Science and Information TechnologyApril 2020 top read artilce in  Computer Science and Information Technology
April 2020 top read artilce in Computer Science and Information Technology
 
Io t trends
Io t trendsIo t trends
Io t trends
 
Your Journey Towards Industry 4.0 with Internet of Things
Your Journey Towards Industry 4.0 with Internet of ThingsYour Journey Towards Industry 4.0 with Internet of Things
Your Journey Towards Industry 4.0 with Internet of Things
 
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCOEl IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
 
InfoRepos Academy Introduction v1.1 - IIOT Experiential Learning Program
InfoRepos Academy  Introduction v1.1 - IIOT Experiential Learning ProgramInfoRepos Academy  Introduction v1.1 - IIOT Experiential Learning Program
InfoRepos Academy Introduction v1.1 - IIOT Experiential Learning Program
 

More from Charles Lim

Toward revealing Advanced Persistence Threats in your organization - Public
Toward revealing Advanced Persistence Threats in your organization - PublicToward revealing Advanced Persistence Threats in your organization - Public
Toward revealing Advanced Persistence Threats in your organization - PublicCharles Lim
 
Sistem pemantauan ancaman serangan siber di indonesia generasi baru public
Sistem pemantauan ancaman serangan siber di indonesia generasi baru publicSistem pemantauan ancaman serangan siber di indonesia generasi baru public
Sistem pemantauan ancaman serangan siber di indonesia generasi baru public
Charles Lim
 
The indonesia darknets revealed– mapping the uncharted territory of the internet
The indonesia darknets revealed– mapping the uncharted territory of the internetThe indonesia darknets revealed– mapping the uncharted territory of the internet
The indonesia darknets revealed– mapping the uncharted territory of the internet
Charles Lim
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceCharles Lim
 
H@dfex 2015 malware analysis
H@dfex 2015   malware analysisH@dfex 2015   malware analysis
H@dfex 2015 malware analysis
Charles Lim
 
Monitoring indonesia darknets - Revealing the unseen security intrusion
Monitoring indonesia darknets - Revealing the unseen security intrusionMonitoring indonesia darknets - Revealing the unseen security intrusion
Monitoring indonesia darknets - Revealing the unseen security intrusion
Charles Lim
 
Mengenal ZEUS Botnet Lebih Dekat
Mengenal ZEUS Botnet Lebih DekatMengenal ZEUS Botnet Lebih Dekat
Mengenal ZEUS Botnet Lebih DekatCharles Lim
 
Managing Cloud Security Risks in Your Organization
Managing Cloud Security Risks in Your OrganizationManaging Cloud Security Risks in Your Organization
Managing Cloud Security Risks in Your Organization
Charles Lim
 
Malware threats in our cyber infrastructure
Malware threats in our cyber infrastructure  Malware threats in our cyber infrastructure
Malware threats in our cyber infrastructure
Charles Lim
 
Workshop on Setting up Malware Lab
Workshop on Setting up Malware LabWorkshop on Setting up Malware Lab
Workshop on Setting up Malware Lab
Charles Lim
 

More from Charles Lim (10)

Toward revealing Advanced Persistence Threats in your organization - Public
Toward revealing Advanced Persistence Threats in your organization - PublicToward revealing Advanced Persistence Threats in your organization - Public
Toward revealing Advanced Persistence Threats in your organization - Public
 
Sistem pemantauan ancaman serangan siber di indonesia generasi baru public
Sistem pemantauan ancaman serangan siber di indonesia generasi baru publicSistem pemantauan ancaman serangan siber di indonesia generasi baru public
Sistem pemantauan ancaman serangan siber di indonesia generasi baru public
 
The indonesia darknets revealed– mapping the uncharted territory of the internet
The indonesia darknets revealed– mapping the uncharted territory of the internetThe indonesia darknets revealed– mapping the uncharted territory of the internet
The indonesia darknets revealed– mapping the uncharted territory of the internet
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
H@dfex 2015 malware analysis
H@dfex 2015   malware analysisH@dfex 2015   malware analysis
H@dfex 2015 malware analysis
 
Monitoring indonesia darknets - Revealing the unseen security intrusion
Monitoring indonesia darknets - Revealing the unseen security intrusionMonitoring indonesia darknets - Revealing the unseen security intrusion
Monitoring indonesia darknets - Revealing the unseen security intrusion
 
Mengenal ZEUS Botnet Lebih Dekat
Mengenal ZEUS Botnet Lebih DekatMengenal ZEUS Botnet Lebih Dekat
Mengenal ZEUS Botnet Lebih Dekat
 
Managing Cloud Security Risks in Your Organization
Managing Cloud Security Risks in Your OrganizationManaging Cloud Security Risks in Your Organization
Managing Cloud Security Risks in Your Organization
 
Malware threats in our cyber infrastructure
Malware threats in our cyber infrastructure  Malware threats in our cyber infrastructure
Malware threats in our cyber infrastructure
 
Workshop on Setting up Malware Lab
Workshop on Setting up Malware LabWorkshop on Setting up Malware Lab
Workshop on Setting up Malware Lab
 

Recently uploaded

Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
kkirkland2
 
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AwangAniqkmals
 
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie WellsCollapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Rosie Wells
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Access Innovations, Inc.
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
amekonnen
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Dutch Power
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
eCommerce Institute
 
2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf
Frederic Leger
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 
Gregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics PresentationGregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics Presentation
gharris9
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
gharris9
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Dutch Power
 
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
SkillCertProExams
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
faizulhassanfaiz1670
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 

Recently uploaded (19)

Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
 
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
 
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie WellsCollapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
 
2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 
Gregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics PresentationGregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics Presentation
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
 
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 

Cyber Security challenges in SMART city

  • 1. 9 Desember 2018 STMIK Insan Pembangunan Tangerang, Banten Charles Lim, Msc., CTIA, CHFI, EDRP, ECSA, ECSP, ECIH, CEH, CEI Cyber Security Challenges in Smart City
  • 2. Master of Information Technology AGENDA Why Smart City How smart is our city? Security Challenges Operational Technology & Smart City Smart City & Cyber Security Smart Steps to Smart City Questions and Anwers 2
  • 3. Master of Information Technology Smart City
  • 4. Master of Information Technology Smart City The Smart City can be defined as the integration of data and digital technologies into a strategic approach to sustainability, citizen well-being and economic development. — National Institute Standard and Technology (NIST)
  • 5. Master of Information Technology Why Smart City https://www.urenio.org/2013/11/04/idc-white-paper-smart-cities-internet-things/
  • 6. Master of Information Technology Complexity of Smart City 6
  • 7. Master of Information Technology Tangerang Live 7
  • 8. Master of Information Technology Smart Waste Management 8
  • 9. Master of Information Technology Internet of Things Landscape 9
  • 10. Master of Information Technology Smart City Ecosystem Framework https://www.iotforall.com/smart-city-ecosystem-framework-model-for-planning-smart- cities/
  • 11. Master of Information Technology Security Challenges
  • 12. Master of Information Technology Security Challenges Insecure Hardware Larger Attack Surface Bandwidth Consumption Application Risk 12
  • 13. Master of Information Technology Data Exchange in Smart City
  • 14. Master of Information Technology Operational Technology & IT
  • 15. Master of Information Technology Operational Technology (OT) & IT http://blog.lnsresearch.com/5-mistakes-companies-make-when-defining-an-operational- architecture/
  • 16. Master of Information Technology Operational Technology (OT) & IT https://www.frontiercomputercorp.com/frontierus/industrial-iot//
  • 17. Master of Information Technology Operational Technology (OT) & IT https://www.frontiercomputercorp.com/frontierus/industrial-iot//
  • 18. Master of Information Technology Smart City & OT https://resources.esri.ca/spatial-data-infrastructure/the-emerging-role-of-gis-in-operational-technology-and-ot- implementations
  • 19. Master of Information Technology Smart City & Cyber Security
  • 20. Master of Information Technology Irrigation System – HACKED !!! https://cyber.bgu.ac.il/hackers-could-cause-havoc-by-pwning-internet-connected-irrigation- systems/
  • 21. Master of Information Technology Internet of Things – HACKED !!!
  • 22. Master of Information Technology Smart City & Cyber Security
  • 23. Master of Information Technology Global Cyber Security Indexhttps://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2017-PDF-E.pdf
  • 24. Master of Information Technology Target: Critical Assets  Critical Assets to be protected:  Infrastructure  Information System  Data 24
  • 25. Master of Information Technology Smart Steps to Smart City
  • 26. Master of Information Technology Smart Steps Start with Smart Policy Protecting Private Information Secure Information at the source Standardize the need to know Implement appropriate deterrents 26 https://www.pwc.com/us/en/services/consulting/cybersecurity/library/broader- perspectives/smart-cities.html
  • 27. Master of Information Technology Law & Regulation http://peraturan.go.id/rancangan-undang-undang-tentang-perlindungan-data-pribadi.html  Key Issues:  Law enforcement to protect private information  Data Retention and Disposal  BSSN or KOMINFO?
  • 28. Master of Information Technology Smart City   People 28 https://www.pwc.com/us/en/services/consulting/cybersecurity/library/broader- perspectives/smart-cities.html Right People Right Time Right Reason
  • 29.
  • 30. Master of Information Technology Questions 30