Page 447 - Shaping smarter and more sustainable cities - Striving for sustainable development goals
P. 447

Recommendations
               It is critical that telesurveillance systems maintain their integrity and availability and that
                 emergency services can rely on wireless or M2M communication to obtain directions and
                 instructions from operational control centers.
               When  information  is  transferred  and  managed  over  unsecured  lines  between  different
                 operators (both internal and external) and with heterogeneous systems, data encryption is
                 required. By leveraging strong two‐factor authentication and one‐time password entry, only
                 trusted personnel can gain access to critical data and control systems. Digital certificates can
                 also be used for authentication, signing and encryption.



                   Wireless communications and hotspots

            Both large and small municipalities offer free wireless hotspots in addition to those provided by
            airports, hotels, and shops. As this trend continues to grow, more and more citizens will be exposed
            to potential vulnerabilities, in particular the younger population who are at risk of being lured into
            unsafe websites and chat rooms.

            Designing and building encryption solutions into devices ensures that they can only communicate
            with the required control center, and that communications can be authenticated.
            Public  WiFi  connections  (both  free  and  paid)  are  increasingly  common,  but  security  for  such
            connections may be lacking or is insufficient. WiFi connections can be provided in coffee shops,
            hotels, airports, parks and even in some streets. The host buys a wireless access point, connects that
            device to the Internet, and broadcasts its signal within a public place. Anyone with a wireless card
            within range of the host's access point can access its network and use the Internet. In order to make
            it quick and easy to use their hotspots, some hosts disable much of the security built into their
            wireless  devices.  This  is  a  notable  trade‐off.  Without  encryption,  your  plain  text  data  passes
            unprotected through the air, where it can be intercepted by cybercrooks.





































            ITU‐T's Technical Reports and Specifications                                                  437
   442   443   444   445   446   447   448   449   450   451   452