Page 454 - Shaping smarter and more sustainable cities - Striving for sustainable development goals
P. 454

management tools in order to ensure that services return to their normal operational status, and to
            minimize the disturbance caused to users.

            Ultimately, modern cities compete with each other to attract businesses, talent, skills and taxpayers.
            As a result, administrations are increasingly valuing the role of innovation, technology, marketing
            and communication practices. In turn, private sector companies are attracted into cities by the ease
            of  doing  business  –  in  terms  of  cost  efficiency,  infrastructure  (e.g.  office  space,  broadband,
            telecommunications, as well as utilities such as energy, water and transportation), and general
            quality of life for their staff (e.g. residential, health care and educational systems).
            The adoption of effective governance structures as part of SSC strategies is closely linked to the
            effectiveness of cybersecurity measures. It is vital to ensure adequate preparedness and operational
            efficiency, as well as to take advantage of opportunities, address emerging needs, and overcome
            the security challenges faced by smart sustainable cities. Further information on SSC governance
            can  be  found  in  the  FG‐SSC  Technical  Report  on  “Engaging  stakeholders  for  smart  sustainable
                  9
            cities” .


            9       Recommendations to ensure SSC service continuity


            Smart  sustainable  cities  should  prioritize  providers  who  offer  solutions  and  methodologies  for
            security, backup, data loss prevention, archiving and disaster recovery, and who are able to protect
            and manage heterogeneous environments resulting from legacy systems and newer deployments,
            including open source, managed mobile devices, and virtualized systems.

                   Protecting information proactively

            SSC contexts increasingly involve big data considerations, and subsequently the need to centralize
            and manage the vast amount of information that is continuously generated and used. Taking an
            information‐centric  approach,  embedding  security  within  data  and  taking  a  content‐aware
            approach to protecting information, is vital for identifying ownership of: (a) the location of sensitive
            information, and (b) who has access to it. Classifying data and utilizing encryption helps to secure
            sensitive information and to restrict access to unauthorized individuals.

                   Authenticating users
            Strong authentication enables organizations to protect public assets by verifying the true identity of
            a  smart  device,  system  or  application.  This  prevents  individuals  from  accidentally  disclosing
            credentials to an attack site, and from attaching unauthorized devices to the infrastructure.
                   Leveraging threat intelligence

            In order to understand the major attack trends, city officials and CIOs can count on an established
            observatory, like the Global Intelligence Network, to provide one of the most extensive and accurate
            vendor‐neutral analyses of trends on malware, security threats and vulnerabilities from security
            research  centers  around  the  world.  The  same  information  is  also  used  to  compile  the  annual
            Internet  Security  Threat  Report,  which  contains  vital  information  about  current  and  emerging
            threats and vulnerabilities.






            9   FG‐SSC deliverable, Technical Report on engaging stakeholders for smart sustainable cities. Available at:
               http://www.itu.int/en/ITU‐T/focusgroups/ssc/Pages/default.aspx

            444                                                      ITU‐T's Technical Reports and Specifications
   449   450   451   452   453   454   455   456   457   458   459