Page 447 - Shaping smarter and more sustainable cities - Striving for sustainable development goals
P. 447
Recommendations
It is critical that telesurveillance systems maintain their integrity and availability and that
emergency services can rely on wireless or M2M communication to obtain directions and
instructions from operational control centers.
When information is transferred and managed over unsecured lines between different
operators (both internal and external) and with heterogeneous systems, data encryption is
required. By leveraging strong two‐factor authentication and one‐time password entry, only
trusted personnel can gain access to critical data and control systems. Digital certificates can
also be used for authentication, signing and encryption.
Wireless communications and hotspots
Both large and small municipalities offer free wireless hotspots in addition to those provided by
airports, hotels, and shops. As this trend continues to grow, more and more citizens will be exposed
to potential vulnerabilities, in particular the younger population who are at risk of being lured into
unsafe websites and chat rooms.
Designing and building encryption solutions into devices ensures that they can only communicate
with the required control center, and that communications can be authenticated.
Public WiFi connections (both free and paid) are increasingly common, but security for such
connections may be lacking or is insufficient. WiFi connections can be provided in coffee shops,
hotels, airports, parks and even in some streets. The host buys a wireless access point, connects that
device to the Internet, and broadcasts its signal within a public place. Anyone with a wireless card
within range of the host's access point can access its network and use the Internet. In order to make
it quick and easy to use their hotspots, some hosts disable much of the security built into their
wireless devices. This is a notable trade‐off. Without encryption, your plain text data passes
unprotected through the air, where it can be intercepted by cybercrooks.
ITU‐T's Technical Reports and Specifications 437