Page 449 - Shaping smarter and more sustainable cities - Striving for sustainable development goals
P. 449

6       SSC components and their vulnerabilities



                   Network infrastructure
            The  network  infrastructure  of  SSC  should  ensure  the  safety  and  reliability  of  communication,
            including various network forms (e.g. cellular network, Internet, satellite network, government and
            enterprise intranets, among others). The vulnerabilities of these networks will be inherited by the
            network infrastructure of SSC and possibly amplified, given the additional complexity of the SSC
            architecture.
            Vulnerabilities of the network infrastructure in SSC may be present in the following areas:

                  There is wide variety of devices involved in a SSC network. A peak of network accesses in a
                    short time might lead to network congestion, a situation favorable to potential attackers. In
                    these cases, authentication and key generation mechanisms can produce further network
                    resource consumption.

                  Internet or next‐generation Internet will be the core carrier of network infrastructure of SSC.
                    Denial of service (DoS) and distributed denial of service (DDoS) attacks across the Internet
                    still exist, hence the need to adopt more robust preventive measures and disaster recovery
                    mechanisms, also taking into account the heterogeneity of technical equipment and their
                    protection capabilities.
                  The  heterogeneity  of  the  network  architectures  will  produce  additional  vulnerabilities,
                    particularly in network authentication.
                  The separation of sensor networks and communication networks will create new security
                    risks. Theft, tampering, counterfeiting information, can disrupt the communication between
                    different types of the network.

                   Cloud computing facilities

            Due to the high concentration of users and information resources, the security consequences of
            cloud delivery are much higher than traditional delivery models. The security issues faced by cloud
            computing technology are as follows:

                  Data concentration security issues
                    o  Cloud computing systems will affect the storage, processing and transmission of user
                       data. If the privacy information is lost or stolen, the user could be seriously impacted.
                       Cloud computing has introduced new types of security challenges, such as how to ensure
                       the security of cloud service management and access control mechanisms inside the
                       security provider, how to implement effective security audits, security monitoring for
                       data manipulation, as well as how to avoid the potential risk of multi‐user coexistence in
                       a cloud computing environment.
                  Data availability in the cloud
                    o  User  data  and  business  applications  are  hosted  in  the  cloud  computing  system.
                       Therefore, business processes are dependent on the service provider's general reliability,
                       in terms of service continuity, service level agreement (SLA) and security policies, as well
                       as user data protection and recovery in case of an incident.

                   Internet of Things
            IoT describes the capability of devices, provided with embedded sensors, to be connected via an IP
            address to the Internet, and exchange data with a remote system.


            ITU‐T's Technical Reports and Specifications                                                  439
   444   445   446   447   448   449   450   451   452   453   454