SlideShare a Scribd company logo
1 of 25
Cyber Security in Smart
Cities
AMIRA SAYED A. AZIZ
PH.D., SCIENTIFIC RESEARCH GROUP IN EGYPT (SRGE)
ASSISTANT PROFESSOR IN UNIVERSITÉ FRANÇAISE D’EGYPTE
Zewail City workshop on Intelligent Systems and application On Saturday 7 March 2015
Agenda
 Introduction to Smart Cities.
 What is?
 Why needed?
 Characteristics and components
 Technologies Involved
 Information Security
 Cyber Security
 Recommended Strategy
Introduction
video
Introduction
 The world is going through urban growth.
 Roughly half of the world’s population lived in an urban area in
2010. By 2050, according to the World Health Organization, nearly 7
out of 10 people will live in an urban environment.
 By 2025 there will be 37 mega-cities with a population above 10
million people, according to the United Nations Environment
Programme.
 The need for smart cities for the management of infrastructure
resources and interactions.
What is a Smart City?
 A Smart City is a city where people living in it can enjoy the best
life qualities.
 Services are efficient, effective, and sustainable while they meet
the needs of the people.
 They are interconnected systems for monitoring, control, and
automation.
 They are intended to improve the quality of life.
 Accessing information anywhere - anytime.
What is a Smart City?
 Smart cities are places with a vibrant and sustainable urban
ecosystem, communities that combine technology and creativity to
solve problems and overcome shared challenges.
 Government work in harmony with community to create
opportunities for and improve the lives of all residents in all
neighborhoods.
 Governor of San Diego, classified in one of the best 10 smart cities in the world.
Why Smart Cities are needed?
 Reduced public spending (public services).
 Increased efficiency and quality of services (resource
management).
 Decision-making support.
 Promoting innovation (new business and social development).
 Real-time information provided.
Characteristics of a Smart City
 They evolve towards a strong integration of
all dimensions of human intelligence,
collective intelligence, and also artificial
intelligence within the city.
 The intelligence of cities "resides in the
increasingly effective combination of digital
telecommunication networks (the nerves),
ubiquitously embedded intelligence (the
brains), sensors and tags (the sensory organs),
and software (the knowledge and cognitive
competence)". W. Mitchell (2007), “Intelligent cities”
Components of a Smart City
 IBM defined the components/citizens of smart city as IN3:
 Instrumented (devices that at minimum respond to a sensor network
 Interconnected (to pass information into a network for analysis and
decision making)
 Intelligent (capable of doing intelligent operations)
Top 10 Smart Cities
video
Technologies Involved
 Cloud computing services.
 Internet of Things (IoT).
 Network of sensors.
 Smart computing devices.
 Communication based on semantic web.
Technologies Involved
 The top 10 companies expected to supply smart cities of the
future are: (Govtech.com, December 2014)
1. IBM
2. Cisco
3. Schneider Electric
4. Siemens
5. Microsoft
6. Hitachi
7. Huawei
8. Ericsson
9. Toshiba
10.Oracle
Internet of Things (IoT)
 According to WhatIs.com, “The Internet of Things (IoT) is a
scenario in which objects, animals or people are provided
with unique identifiers and the ability to automatically transfer data
over a network without requiring human-to-human or human-to-
computer interaction”.
Internet of Things (IoT)
 A thing, in the Internet of Things, can
be a person with a heart monitor
implant, a farm animal with a biochip
transponder, an automobile that has
built-in sensors to alert the driver when
tire pressure is low – or any other
natural or man-made object that can be
assigned an IP address and provided
with the ability to transfer data over a
network.
Information Security in Smart Cities
 The instrumented source may have particular rights or risks
associated with particular types of information.
 The collections of that information (such as on the device or on a
cloud aggregator) similarly invokes issues of rights, duties, and risks.
Information
Used
Information
Generated
Information Security in Smart Cities
Information
Gathered
Personal
Life
Work Life
Home
Life
Transport
Social Life
Smart City Design
 Cyber Security
 Privacy
 Integrity
 Compliance
 Reliability
 Resilience
Security in Smart Cities
 Security is a global idea tied to safety (life, property, and rights) as
an assurance that a person may go about their life without injury.
 Cyber security is a subset of security that focuses on the
computing systems, data exchange channels, and the information
they process.
 Information security interlace with cyber security with the focus of
information processed.
Cyber Security in Smart Cities
 Cyber security is a critical issue due to the increasing potential of
cyber attacks and incidents against critical sectors in Smart City.
 Different types of threats:
 Data: personally identifiable information (PII) at risk
 natural disasters
 malicious activities
 DDoS attacks
 Systems: malicious and unintentional compromise that may cause service
interruption
Cyber Security in Smart Cities
 To protect Smart City in a proper way, a number of security
problems have to be faced according to a specific design/plan.
 These issues are:
 Privacy
 Network connectivity
 Complexity
 Security services
 Sensitive data organization
 Availability
 Emergency plan
 Key management
Cyber Security Strategy
• Develop a clear structure for risk assessment and
management
• Use threat modeling to assess threats.
• Document and review risk acceptance and exceptions.
• Make risk assessment and management an ongoing process.
Build a risk-
based approach
to cyber security
• Educate city leaders to understand and support the principles
and to manage priorities.
• Consider resilience.
• Leverage procurement processes to reflect priorities and
risks.
Set clear
priorities
Cyber Security Strategy
•Establish minimum security baselines.
•Define clear responsibilities for supporting a security baseline.
•Establish a system for continuous security monitoring.
Define minimum
ICT security
baseline
•Set expectations for sharing threat and vulnerability information.
•Create a cross-city mechanism for sharing.
•Run cyberdrills to test game plans.
•Emphasize privacy and civil liberty protections in threat information sharing.
•Apply relevant national or international standards for information sharing.
Share and
coordinate threat
and vulnerability
information
Cyber Security Strategy
• Create a Computer Emergency Response Team (CERT).
• Create clear ownership.
• Engage private sector and national resources.
• Enable consistent incident classification.
• Test incident response capabilities and processes.
Build incident
response
capabilities
• Develop public awareness campaigns.
• Cultivate employee development and workforce training
programs.
Boost public
awareness,
education, and
workforce training
Cyber Security Strategy
• Take advantage of private sector resources.
• Partner with universities.
• Sponsor events to connect the public and private sector.
• Promote law enforcement cooperation while protecting
privacy and civil liberties.
• Create a culture of technology innovation.
Enable public,
private, and
academic
cooperation
Scientific
Research Group
in Egypt

More Related Content

What's hot

Internet of Things
Internet of ThingsInternet of Things
Internet of Thingspkshc01
 
Internet of Things for Smart Cities
Internet of Things for Smart CitiesInternet of Things for Smart Cities
Internet of Things for Smart CitiesMphasis
 
IOT and smart city in India
IOT and smart city in India IOT and smart city in India
IOT and smart city in India Soumya Gupta
 
Internet of things - challenges scopes and solutions
Internet of things - challenges scopes and solutionsInternet of things - challenges scopes and solutions
Internet of things - challenges scopes and solutionsShivam Kumar
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsAbdullah Alfadhly
 
Internet of things (iot)
Internet of things (iot)Internet of things (iot)
Internet of things (iot)sankar s
 
Smart City Smart Strategy
Smart City Smart StrategySmart City Smart Strategy
Smart City Smart StrategyJin-Hyeok Yang
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranKoenig Solutions Ltd.
 
Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.RajeshkumarInternet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.RajeshkumarRAJESHKUMARG12
 

What's hot (20)

Smart City – Research Highlights
Smart City – Research HighlightsSmart City – Research Highlights
Smart City – Research Highlights
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
IOT DATA AND BIG DATA
IOT DATA AND BIG DATAIOT DATA AND BIG DATA
IOT DATA AND BIG DATA
 
Internet of Things for Smart Cities
Internet of Things for Smart CitiesInternet of Things for Smart Cities
Internet of Things for Smart Cities
 
IOT and smart city in India
IOT and smart city in India IOT and smart city in India
IOT and smart city in India
 
Internet of things - challenges scopes and solutions
Internet of things - challenges scopes and solutionsInternet of things - challenges scopes and solutions
Internet of things - challenges scopes and solutions
 
Smart Cities 2019
Smart Cities 2019 Smart Cities 2019
Smart Cities 2019
 
CISCO SMART CITY
CISCO SMART CITYCISCO SMART CITY
CISCO SMART CITY
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and Protocols
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Simple Internet Of Things (IoT) PPT 2020
Simple Internet Of Things (IoT) PPT 2020 Simple Internet Of Things (IoT) PPT 2020
Simple Internet Of Things (IoT) PPT 2020
 
Internet of things (iot)
Internet of things (iot)Internet of things (iot)
Internet of things (iot)
 
Smart City Smart Strategy
Smart City Smart StrategySmart City Smart Strategy
Smart City Smart Strategy
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.RajeshkumarInternet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
 
Introduction to IoT (Internet of Things)
Introduction to IoT (Internet of Things)Introduction to IoT (Internet of Things)
Introduction to IoT (Internet of Things)
 
Iot
IotIot
Iot
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Smart cities
Smart citiesSmart cities
Smart cities
 

Viewers also liked

Role Of Ict In Smart City By Siddique Lutful Kabir, Noor
Role Of Ict In Smart City By Siddique Lutful Kabir, NoorRole Of Ict In Smart City By Siddique Lutful Kabir, Noor
Role Of Ict In Smart City By Siddique Lutful Kabir, Noormuzkara
 
Creating Smarter Cities 2011 - 14 - Patrizia Lombardi - Triple Helix of Smart...
Creating Smarter Cities 2011 - 14 - Patrizia Lombardi - Triple Helix of Smart...Creating Smarter Cities 2011 - 14 - Patrizia Lombardi - Triple Helix of Smart...
Creating Smarter Cities 2011 - 14 - Patrizia Lombardi - Triple Helix of Smart...Smart Cities Project
 
The Tale of a Smarter City
The Tale of a Smarter CityThe Tale of a Smarter City
The Tale of a Smarter CityChris Luongo
 
Smarter Cities | IET Talk on the Built Environment in 2050
Smarter Cities | IET Talk on the Built Environment in 2050Smarter Cities | IET Talk on the Built Environment in 2050
Smarter Cities | IET Talk on the Built Environment in 2050Alexis Biller
 

Viewers also liked (9)

Role Of Ict In Smart City By Siddique Lutful Kabir, Noor
Role Of Ict In Smart City By Siddique Lutful Kabir, NoorRole Of Ict In Smart City By Siddique Lutful Kabir, Noor
Role Of Ict In Smart City By Siddique Lutful Kabir, Noor
 
Smart city
Smart citySmart city
Smart city
 
Creating Smarter Cities 2011 - 14 - Patrizia Lombardi - Triple Helix of Smart...
Creating Smarter Cities 2011 - 14 - Patrizia Lombardi - Triple Helix of Smart...Creating Smarter Cities 2011 - 14 - Patrizia Lombardi - Triple Helix of Smart...
Creating Smarter Cities 2011 - 14 - Patrizia Lombardi - Triple Helix of Smart...
 
The Tale of a Smarter City
The Tale of a Smarter CityThe Tale of a Smarter City
The Tale of a Smarter City
 
Smart cities foster v1
Smart cities   foster v1Smart cities   foster v1
Smart cities foster v1
 
Smarter Cities | IET Talk on the Built Environment in 2050
Smarter Cities | IET Talk on the Built Environment in 2050Smarter Cities | IET Talk on the Built Environment in 2050
Smarter Cities | IET Talk on the Built Environment in 2050
 
Smart City Amsterdam Daan Velthauzs AIM
Smart City Amsterdam Daan Velthauzs AIMSmart City Amsterdam Daan Velthauzs AIM
Smart City Amsterdam Daan Velthauzs AIM
 
Presentasi Smart City
Presentasi Smart CityPresentasi Smart City
Presentasi Smart City
 
SmartCity Indonesia
SmartCity IndonesiaSmartCity Indonesia
SmartCity Indonesia
 

Similar to Cyber security in smart cities

Security Attacks and Countermeasures on Cloud Assisted IoT App.docx
Security Attacks and Countermeasures on Cloud Assisted IoT App.docxSecurity Attacks and Countermeasures on Cloud Assisted IoT App.docx
Security Attacks and Countermeasures on Cloud Assisted IoT App.docxedgar6wallace88877
 
VET4SBO Level 1 module 3 - unit 1 - v1.0 en
VET4SBO Level 1   module 3 - unit 1 - v1.0 enVET4SBO Level 1   module 3 - unit 1 - v1.0 en
VET4SBO Level 1 module 3 - unit 1 - v1.0 enKarel Van Isacker
 
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...IJNSA Journal
 
Cloud, Big Data, IoT, ML - together to build a real world use case!
Cloud, Big Data, IoT, ML - together to build a real world use case!Cloud, Big Data, IoT, ML - together to build a real world use case!
Cloud, Big Data, IoT, ML - together to build a real world use case!Krishna-Kumar
 
The-Internet-Of-Things-4th-Industrial-Revolution.pptx
The-Internet-Of-Things-4th-Industrial-Revolution.pptxThe-Internet-Of-Things-4th-Industrial-Revolution.pptx
The-Internet-Of-Things-4th-Industrial-Revolution.pptxHadHic
 
Smart City, Internet de las cosas al servicio de los ciudadanos - Jorge Guerra
Smart City, Internet de las cosas al servicio de los ciudadanos - Jorge GuerraSmart City, Internet de las cosas al servicio de los ciudadanos - Jorge Guerra
Smart City, Internet de las cosas al servicio de los ciudadanos - Jorge GuerraLab San Isidro
 
2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, .docx
2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, .docx2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, .docx
2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, .docxjesusamckone
 
IOT Model An Overview
IOT Model An OverviewIOT Model An Overview
IOT Model An OverviewKnoldus Inc.
 
IRJET- Smart City: Overview and Security Challenges
IRJET- Smart City: Overview and Security ChallengesIRJET- Smart City: Overview and Security Challenges
IRJET- Smart City: Overview and Security ChallengesIRJET Journal
 
Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015Nikhil Dikshit
 
SN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoTSN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoTSukumar Nayak
 
Smart Security Infrastructure
Smart Security InfrastructureSmart Security Infrastructure
Smart Security InfrastructureGAURAV. H .TANDON
 
Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017Den Reymer
 
smart security infrastructure
smart security infrastructuresmart security infrastructure
smart security infrastructureShreyas Satpute
 
Artificial intelligence and Internet of Things.pptx
Artificial intelligence and Internet of Things.pptxArtificial intelligence and Internet of Things.pptx
Artificial intelligence and Internet of Things.pptxSriLakshmi643165
 

Similar to Cyber security in smart cities (20)

Security Attacks and Countermeasures on Cloud Assisted IoT App.docx
Security Attacks and Countermeasures on Cloud Assisted IoT App.docxSecurity Attacks and Countermeasures on Cloud Assisted IoT App.docx
Security Attacks and Countermeasures on Cloud Assisted IoT App.docx
 
VET4SBO Level 1 module 3 - unit 1 - v1.0 en
VET4SBO Level 1   module 3 - unit 1 - v1.0 enVET4SBO Level 1   module 3 - unit 1 - v1.0 en
VET4SBO Level 1 module 3 - unit 1 - v1.0 en
 
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
 
Securing Smart Cities
Securing Smart CitiesSecuring Smart Cities
Securing Smart Cities
 
IOT Demystified
IOT DemystifiedIOT Demystified
IOT Demystified
 
IoT and Smart Cities
IoT and Smart CitiesIoT and Smart Cities
IoT and Smart Cities
 
Cloud, Big Data, IoT, ML - together to build a real world use case!
Cloud, Big Data, IoT, ML - together to build a real world use case!Cloud, Big Data, IoT, ML - together to build a real world use case!
Cloud, Big Data, IoT, ML - together to build a real world use case!
 
The-Internet-Of-Things-4th-Industrial-Revolution.pptx
The-Internet-Of-Things-4th-Industrial-Revolution.pptxThe-Internet-Of-Things-4th-Industrial-Revolution.pptx
The-Internet-Of-Things-4th-Industrial-Revolution.pptx
 
Smart City, Internet de las cosas al servicio de los ciudadanos - Jorge Guerra
Smart City, Internet de las cosas al servicio de los ciudadanos - Jorge GuerraSmart City, Internet de las cosas al servicio de los ciudadanos - Jorge Guerra
Smart City, Internet de las cosas al servicio de los ciudadanos - Jorge Guerra
 
2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, .docx
2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, .docx2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, .docx
2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, .docx
 
IOT Model An Overview
IOT Model An OverviewIOT Model An Overview
IOT Model An Overview
 
IRJET- Smart City: Overview and Security Challenges
IRJET- Smart City: Overview and Security ChallengesIRJET- Smart City: Overview and Security Challenges
IRJET- Smart City: Overview and Security Challenges
 
Smart_City
Smart_CitySmart_City
Smart_City
 
Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015
 
SN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoTSN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoT
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
 
Smart Security Infrastructure
Smart Security InfrastructureSmart Security Infrastructure
Smart Security Infrastructure
 
Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017
 
smart security infrastructure
smart security infrastructuresmart security infrastructure
smart security infrastructure
 
Artificial intelligence and Internet of Things.pptx
Artificial intelligence and Internet of Things.pptxArtificial intelligence and Internet of Things.pptx
Artificial intelligence and Internet of Things.pptx
 

More from Aboul Ella Hassanien

الأطر والمبادئ الاخلاقية للذكاء الاصطناعي التوليدى.pdf
الأطر والمبادئ الاخلاقية  للذكاء الاصطناعي التوليدى.pdfالأطر والمبادئ الاخلاقية  للذكاء الاصطناعي التوليدى.pdf
الأطر والمبادئ الاخلاقية للذكاء الاصطناعي التوليدى.pdfAboul Ella Hassanien
 
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية المعر...
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية  المعر...دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية  المعر...
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية المعر...Aboul Ella Hassanien
 
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...Aboul Ella Hassanien
 
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...Aboul Ella Hassanien
 
Intelligent Avatars in the Metaverse.pptx
Intelligent Avatars in the Metaverse.pptxIntelligent Avatars in the Metaverse.pptx
Intelligent Avatars in the Metaverse.pptxAboul Ella Hassanien
 
دليل البحث العلمى .pdf
دليل البحث العلمى .pdfدليل البحث العلمى .pdf
دليل البحث العلمى .pdfAboul Ella Hassanien
 
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات Aboul Ella Hassanien
 
الصحافة والإعلام الرقمى فى عصر الذكاء الاصطناعي
الصحافة والإعلام الرقمى  فى عصر الذكاء الاصطناعي  الصحافة والإعلام الرقمى  فى عصر الذكاء الاصطناعي
الصحافة والإعلام الرقمى فى عصر الذكاء الاصطناعي Aboul Ella Hassanien
 
الميتافيرس و مستقبل التعليم فى الوطن العربى
الميتافيرس و مستقبل التعليم فى الوطن العربى الميتافيرس و مستقبل التعليم فى الوطن العربى
الميتافيرس و مستقبل التعليم فى الوطن العربى Aboul Ella Hassanien
 
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنيةالذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنيةAboul Ella Hassanien
 
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنيةالذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنيةAboul Ella Hassanien
 
التغير المناخى للاطفال
التغير المناخى للاطفالالتغير المناخى للاطفال
التغير المناخى للاطفالAboul Ella Hassanien
 
الذكاء الاصطناعى للاطفال
الذكاء الاصطناعى للاطفالالذكاء الاصطناعى للاطفال
الذكاء الاصطناعى للاطفالAboul Ella Hassanien
 
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسىإستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسىAboul Ella Hassanien
 
الإقتصاد الأخضر لمواجهة التغيرات المناخية
الإقتصاد الأخضر لمواجهة التغيرات المناخية  الإقتصاد الأخضر لمواجهة التغيرات المناخية
الإقتصاد الأخضر لمواجهة التغيرات المناخية Aboul Ella Hassanien
 
الإستخدام المسؤول للذكاء الإصطناعى فى سياق تغيرالمناخ خارطة طريق فى عال...
   الإستخدام المسؤول للذكاء الإصطناعى  فى سياق تغيرالمناخ   خارطة طريق فى عال...   الإستخدام المسؤول للذكاء الإصطناعى  فى سياق تغيرالمناخ   خارطة طريق فى عال...
الإستخدام المسؤول للذكاء الإصطناعى فى سياق تغيرالمناخ خارطة طريق فى عال...Aboul Ella Hassanien
 
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسية
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسيةالذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسية
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسيةAboul Ella Hassanien
 
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى Aboul Ella Hassanien
 

More from Aboul Ella Hassanien (20)

الأطر والمبادئ الاخلاقية للذكاء الاصطناعي التوليدى.pdf
الأطر والمبادئ الاخلاقية  للذكاء الاصطناعي التوليدى.pdfالأطر والمبادئ الاخلاقية  للذكاء الاصطناعي التوليدى.pdf
الأطر والمبادئ الاخلاقية للذكاء الاصطناعي التوليدى.pdf
 
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية المعر...
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية  المعر...دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية  المعر...
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية المعر...
 
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
 
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
 
Intelligent Avatars in the Metaverse.pptx
Intelligent Avatars in the Metaverse.pptxIntelligent Avatars in the Metaverse.pptx
Intelligent Avatars in the Metaverse.pptx
 
دليل البحث العلمى .pdf
دليل البحث العلمى .pdfدليل البحث العلمى .pdf
دليل البحث العلمى .pdf
 
SRGE photo.pdf
SRGE photo.pdfSRGE photo.pdf
SRGE photo.pdf
 
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
 
الصحافة والإعلام الرقمى فى عصر الذكاء الاصطناعي
الصحافة والإعلام الرقمى  فى عصر الذكاء الاصطناعي  الصحافة والإعلام الرقمى  فى عصر الذكاء الاصطناعي
الصحافة والإعلام الرقمى فى عصر الذكاء الاصطناعي
 
الميتافيرس و مستقبل التعليم فى الوطن العربى
الميتافيرس و مستقبل التعليم فى الوطن العربى الميتافيرس و مستقبل التعليم فى الوطن العربى
الميتافيرس و مستقبل التعليم فى الوطن العربى
 
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنيةالذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
 
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنيةالذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
 
التغير المناخى للاطفال
التغير المناخى للاطفالالتغير المناخى للاطفال
التغير المناخى للاطفال
 
الذكاء الاصطناعى للاطفال
الذكاء الاصطناعى للاطفالالذكاء الاصطناعى للاطفال
الذكاء الاصطناعى للاطفال
 
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسىإستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
 
الإقتصاد الأخضر لمواجهة التغيرات المناخية
الإقتصاد الأخضر لمواجهة التغيرات المناخية  الإقتصاد الأخضر لمواجهة التغيرات المناخية
الإقتصاد الأخضر لمواجهة التغيرات المناخية
 
الإستخدام المسؤول للذكاء الإصطناعى فى سياق تغيرالمناخ خارطة طريق فى عال...
   الإستخدام المسؤول للذكاء الإصطناعى  فى سياق تغيرالمناخ   خارطة طريق فى عال...   الإستخدام المسؤول للذكاء الإصطناعى  فى سياق تغيرالمناخ   خارطة طريق فى عال...
الإستخدام المسؤول للذكاء الإصطناعى فى سياق تغيرالمناخ خارطة طريق فى عال...
 
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسية
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسيةالذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسية
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسية
 
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى
 
اقتصاد ميتافيرس
اقتصاد ميتافيرساقتصاد ميتافيرس
اقتصاد ميتافيرس
 

Recently uploaded

Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 

Recently uploaded (20)

Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 

Cyber security in smart cities

  • 1. Cyber Security in Smart Cities AMIRA SAYED A. AZIZ PH.D., SCIENTIFIC RESEARCH GROUP IN EGYPT (SRGE) ASSISTANT PROFESSOR IN UNIVERSITÉ FRANÇAISE D’EGYPTE Zewail City workshop on Intelligent Systems and application On Saturday 7 March 2015
  • 2. Agenda  Introduction to Smart Cities.  What is?  Why needed?  Characteristics and components  Technologies Involved  Information Security  Cyber Security  Recommended Strategy
  • 4. Introduction  The world is going through urban growth.  Roughly half of the world’s population lived in an urban area in 2010. By 2050, according to the World Health Organization, nearly 7 out of 10 people will live in an urban environment.  By 2025 there will be 37 mega-cities with a population above 10 million people, according to the United Nations Environment Programme.  The need for smart cities for the management of infrastructure resources and interactions.
  • 5. What is a Smart City?  A Smart City is a city where people living in it can enjoy the best life qualities.  Services are efficient, effective, and sustainable while they meet the needs of the people.  They are interconnected systems for monitoring, control, and automation.  They are intended to improve the quality of life.  Accessing information anywhere - anytime.
  • 6. What is a Smart City?  Smart cities are places with a vibrant and sustainable urban ecosystem, communities that combine technology and creativity to solve problems and overcome shared challenges.  Government work in harmony with community to create opportunities for and improve the lives of all residents in all neighborhoods.  Governor of San Diego, classified in one of the best 10 smart cities in the world.
  • 7. Why Smart Cities are needed?  Reduced public spending (public services).  Increased efficiency and quality of services (resource management).  Decision-making support.  Promoting innovation (new business and social development).  Real-time information provided.
  • 8. Characteristics of a Smart City  They evolve towards a strong integration of all dimensions of human intelligence, collective intelligence, and also artificial intelligence within the city.  The intelligence of cities "resides in the increasingly effective combination of digital telecommunication networks (the nerves), ubiquitously embedded intelligence (the brains), sensors and tags (the sensory organs), and software (the knowledge and cognitive competence)". W. Mitchell (2007), “Intelligent cities”
  • 9. Components of a Smart City  IBM defined the components/citizens of smart city as IN3:  Instrumented (devices that at minimum respond to a sensor network  Interconnected (to pass information into a network for analysis and decision making)  Intelligent (capable of doing intelligent operations)
  • 10. Top 10 Smart Cities video
  • 11. Technologies Involved  Cloud computing services.  Internet of Things (IoT).  Network of sensors.  Smart computing devices.  Communication based on semantic web.
  • 12. Technologies Involved  The top 10 companies expected to supply smart cities of the future are: (Govtech.com, December 2014) 1. IBM 2. Cisco 3. Schneider Electric 4. Siemens 5. Microsoft 6. Hitachi 7. Huawei 8. Ericsson 9. Toshiba 10.Oracle
  • 13. Internet of Things (IoT)  According to WhatIs.com, “The Internet of Things (IoT) is a scenario in which objects, animals or people are provided with unique identifiers and the ability to automatically transfer data over a network without requiring human-to-human or human-to- computer interaction”.
  • 14. Internet of Things (IoT)  A thing, in the Internet of Things, can be a person with a heart monitor implant, a farm animal with a biochip transponder, an automobile that has built-in sensors to alert the driver when tire pressure is low – or any other natural or man-made object that can be assigned an IP address and provided with the ability to transfer data over a network.
  • 15. Information Security in Smart Cities  The instrumented source may have particular rights or risks associated with particular types of information.  The collections of that information (such as on the device or on a cloud aggregator) similarly invokes issues of rights, duties, and risks. Information Used Information Generated
  • 16. Information Security in Smart Cities Information Gathered Personal Life Work Life Home Life Transport Social Life
  • 17. Smart City Design  Cyber Security  Privacy  Integrity  Compliance  Reliability  Resilience
  • 18. Security in Smart Cities  Security is a global idea tied to safety (life, property, and rights) as an assurance that a person may go about their life without injury.  Cyber security is a subset of security that focuses on the computing systems, data exchange channels, and the information they process.  Information security interlace with cyber security with the focus of information processed.
  • 19. Cyber Security in Smart Cities  Cyber security is a critical issue due to the increasing potential of cyber attacks and incidents against critical sectors in Smart City.  Different types of threats:  Data: personally identifiable information (PII) at risk  natural disasters  malicious activities  DDoS attacks  Systems: malicious and unintentional compromise that may cause service interruption
  • 20. Cyber Security in Smart Cities  To protect Smart City in a proper way, a number of security problems have to be faced according to a specific design/plan.  These issues are:  Privacy  Network connectivity  Complexity  Security services  Sensitive data organization  Availability  Emergency plan  Key management
  • 21. Cyber Security Strategy • Develop a clear structure for risk assessment and management • Use threat modeling to assess threats. • Document and review risk acceptance and exceptions. • Make risk assessment and management an ongoing process. Build a risk- based approach to cyber security • Educate city leaders to understand and support the principles and to manage priorities. • Consider resilience. • Leverage procurement processes to reflect priorities and risks. Set clear priorities
  • 22. Cyber Security Strategy •Establish minimum security baselines. •Define clear responsibilities for supporting a security baseline. •Establish a system for continuous security monitoring. Define minimum ICT security baseline •Set expectations for sharing threat and vulnerability information. •Create a cross-city mechanism for sharing. •Run cyberdrills to test game plans. •Emphasize privacy and civil liberty protections in threat information sharing. •Apply relevant national or international standards for information sharing. Share and coordinate threat and vulnerability information
  • 23. Cyber Security Strategy • Create a Computer Emergency Response Team (CERT). • Create clear ownership. • Engage private sector and national resources. • Enable consistent incident classification. • Test incident response capabilities and processes. Build incident response capabilities • Develop public awareness campaigns. • Cultivate employee development and workforce training programs. Boost public awareness, education, and workforce training
  • 24. Cyber Security Strategy • Take advantage of private sector resources. • Partner with universities. • Sponsor events to connect the public and private sector. • Promote law enforcement cooperation while protecting privacy and civil liberties. • Create a culture of technology innovation. Enable public, private, and academic cooperation