Page 436 - Shaping smarter and more sustainable cities - Striving for sustainable development goals
P. 436

Executive Summary

            Smart  sustainable  cities  (SSC)  are  highly  dependent  on  information  and  communication
            technologies (ICTs), including Internet of Things (IoT), radio frequency identification (RFID), and
            machine‐to‐machine (M2M). The advanced underlying infrastructure not only resolves the need for
            hyper‐connectivity for smart sustainable city components and services, but also introduces higher
            levels of complexity and higher volumes of data. Increased system complexity opens new doors and
            opportunities for malicious cyberattacks and data loss in the case of serious incidents, including
            natural disasters. The linkages that exist between the higher levels of complexity, connectivity and
            data volumes that characterize SSC, which together lead to exacerbated levels of vulnerability to
            security threats, can be summarized as follows:

                    Hyper complexity + hyper connectivity + hyper data volumes = hyper vulnerability

            Given the increasing interconnectedness of smart sustainable city environments, security incidents
            can  prove  highly  penalizing  for  the  systems  they  affect,  for  the  city  services  they  control,  and
            ultimately for the citizens and end users of the services.

            A very compelling need for SSC is therefore to guarantee the protection of the relevant ICT systems
            and the various technologies involved, as well as the data used to govern the systems and the
            services.
            Cybersecurity, information protection and system resilience constitute political and governance
            issues at the forefront of new developments in this field. As they closely relate to both governance
            and policy, they require the attention of public administrators and decision‐makers, especially given
            the potential effects of malicious attacks and disasters on critical ICT systems and infrastructure,
            including citizens' deprivation of essential services, from transportation to utilities (e.g. smart grid,
            water management), health care, emergency services, and public safety, among others.

            With  appropriate  processes  in  place,  multi‐stakeholder  collaboration  and  good  governance,
            technology can provide tangible solutions to issues related to cybersecurity, information protection
            and system resilience.

            Within  this  context,  this  Technical  Report  provides  a  detailed  account  of  the  potential  cyber‐
            vulnerabilities of SSC, and a set of Recommendations to ensure the protection and resilience of the
            services offered to the citizens.
            This Technical Report is structured around nine sections.

            Section 1 provides the introductory background and scope. Section 2 provides working definitions
            for the notions that are at the core of this Technical Report, namely "resilience", "cybersecurity"
            and "data protection". Section 3 describes the main implications of ICT use in the contexts of SSC. It
            explores the IoT, the rising technology at the base of the SCC paradigm, as well as other ICTs that
            introduce new potential threats to the integrity and security of the systems involved. Section 4
            provides  a  general  overview  of  the  technical  architecture  of  SSC  in  order  to  contextualize  the
            analysis and to illustrate the complex security challenges faced by SSC strategists and implementers.
















            426                                                      ITU‐T's Technical Reports and Specifications
   431   432   433   434   435   436   437   438   439   440   441