CIOREVIEW >> Smart City >>

Protecting Nations- How to Secure a Nation as Smart Cities Grow

Stephen Brennan, Senior Vice President, Cyber Network Defence, DarkMatter

It is often taken for granted, or at least there appears to be a conscious ignorance, that everything from the electricity that charges our smartphones and powers our houses, through to the vast and complex supply chains that stock our countries’ grocery stores, rely almost completely on complex information systems. This infrastructure ensures today’s nations and their citizens have the opportunities to prosper, helping to build a stronger tomorrow.

However, assigning responsibility for critical infrastructure protection is complex and will only grow as smart cities develop. Whilst the government has a role to play in ensuring the supply of essential services, up to 85 percent of critical infrastructure in the United States and 90 percent in Australia for example, is owned or operated by private industry or public/private partnerships. Some industries have strong regulatory frameworks and well-established cyber security practices, but some sectors struggle to maintain basic levels of cyber resilience.

National security, economic prosperity and social well-being rely on the availability, integrity and confidentiality of a range of information and communications technology. This includes desktop computers, the internet, telecommunications, mobile communication devices and other computer systems and networks.

The risk to the national economy from computer intrusion and the spread of malicious code by organ-ised crime has been assessed as high. An increase in the scale, sophistica¬tion and perpetration of cyber crime has made it increasingly difficult to identify and defeat. Attacks affecting critical infrastructure that power smart cities, have become regular events and alarmingly effective.

The growing array of state and non-state sponsored actors who are compromising, stealing, changing or destroying information is increasingly blurred, potentially causing critical disruptions to information systems. The distinction between traditional threat actors—hackers, terrorists, organised criminal networks, industrial spies and foreign intelligence services—is also becoming more difficult to differentiate.

A nation’s approach to cyber security is contained within its Cyber Security Strategy. The aim of the strategy is to promote a secure, resilient and trusted electronic operating environment that supports national security and maximises the benefits of the digital economy.

The objectives of a cyber security strategy are that:

• All citizens become aware of cyber risks, secure their computers and take steps to protect their identities, privacy and finances online.

• Businesses operate secure and resilient information and communications technologies to protect the integrity of their own operations and the identity and privacy of their customers.

• The Government ensures its information and communications technologies are secure and resilient.

The core principles established as best practice to meet these goals include:

National leadership: The scale and complexity of the cyber security challenge requires strong national leadership.

Shared responsibilities: All users, in enjoying the benefits of information and communications technologies, should take reasonable steps to secure their own systems, exercise care in the communication and storage of sensitive information, and have an obligation to respect the information and systems of other users.

Strategic partnerships: In light of these shared responsibilities, a partnership approach to cyber security across all governments, the private sector and the broader local and international community is essential.

Active international engagement: Given the transnational nature of the internet, in which effective cyber security requires coordinated global action, corporates and individuals must adopt an active, multi-layered approach to international engagement on cyber security.

Risk management: Today’s current threat landscape is truly global where all internet-connected systems are potentially vulnerable and where cyber attacks are difficult to detect, there is no such thing as absolute cyber security. It is imperative that we apply a risk-based approach to assessing, prioritising and resourcing cyber security activities backed up by the trusted ability to validate.

Protecting national values: Successful next generation communities and economies must pursue cyber security policies that enhance individual and collective security while preserving fundamental values and freedoms. Maintaining this balance is a continuing challenge for all modern economies seeking to meet the complex cyber security challenges of the future.

Read Also

Unclogging the Branch and Call Center Traffic Jam

Unclogging the Branch and Call Center Traffic Jam

Edward Vidal, Director IT Service Management Office, Memorial Healthcare System
Real-Time Analytics: The Future of Higher-Education Digital Marketing

Real-Time Analytics: The Future of Higher-Education Digital Marketing

Joe DeCosmo, Chief Analytics Officer, Enova Decisions
The Future of Computing: Hype, Hope, and Reality

The Future of Computing: Hype, Hope, and Reality

Bill Reichert, Partner, Pegasus Tech Ventures
Asset Management: Building a Foundation for Smart Decisions

Asset Management: Building a Foundation for Smart Decisions

Elizabeth Young, GISP, City of Fort Worth
How to Attune your Business using Big Data Analytics in a Newly formed Covid19 Environment?

How to Attune your Business using Big Data Analytics in a Newly...

Aleksandar Lazarevic, VP of Advanced Analytics & Data Engineering, Stanley Black & Decker
How to Achieve a True Internet of Things (IoT) Implementation

How to Achieve a True Internet of Things (IoT) Implementation

Jolene Baker, Sr. Manufacturing Intelligence Specialist, LSI Logical Systems