Free Essay

How Should Singapore and Other Smart Cities Deal with the Increasing Risk of Cyber Threats?

In:

Submitted By cybersec443
Words 417
Pages 2
How should Singapore and other smart cities deal with the increasing risk of cyber threats?

Fifty years after its establishment, Singapore is a smart city-state success story at the forefront of a third industrial revolution. Today, the Internet of Things (IoT) increasingly interconnects Singapore’s cyber and physical systems, sensors and smart technology into the digital fabric that links society and critical infrastructures such as transportation, health, finance and defense. Infrastructure investment is expected to grow by 50% to about $30 billion by the end of the decade.

But as Singapore and other smart cities become increasingly connected to cyberspace, so too does their risk of cyber threats. For the next 50 years to be as prosperous as the last, Singapore and other smart cities and nations need to develop a cyber-smart workforce, technology, policies and new risk management solutions.
Cyber Smart City: Opportunity and Challenge

The Cyber Smart City Opportunity of new IoT-inspired products, services and markets could boost the gross domestic product (GDP) of the world’s 20 largest economies by $14.2 trillion in 2030, according to a recent study by Accenture. This trend can be seen in Singapore’s smart buildings, where converged information and operational technologies infrastructures, control systems and sensors integrate multiple electronic systems to support building management and business functions. Smart building technology is increasing energy efficiency and conservation of natural resources. Smart transportation is making cities more efficient. Smart health solutions are making cities healthier and providing early warning against pandemics.

The Cyber Smart City Challenge is to secure all of these converged networks and devices from cyber threats. Hackers continue to exploit smart devices to steal, manipulate and disrupt cyber and physical systems. Cyber attacks have been used to infiltrate corporate networks through smart building controls, blow up furnaces in steel plants and cause generators to fail. In 2013, Target, a large US retailer, was hacked through its smart heating ventilation and cooling system, exposing corporate networks and over 40 million customers’ credit cards. Similar vulnerabilities are prevalent in thousands of networked smart systems.

A cyber-secure smart city will require a more holistic cyber security approach that fosters a culture of cyber security. Traditional information assurance solutions to risk management are challenged by IoT’s expanded attack landscape: more networked devices exchanging larger data sets. Secondly, many industrial control systems need to be running 24/7, they lack secure communication protocol and include legacy devices that are not interoperable or secure when combined with new IoT technology.

Similar Documents

Premium Essay

Global Profiles of the Fraudsters

...Global profiles of the fraudster White-collar crime – present and future kpmg.com/fraudster 2 Global profiles of the fraudster F Introduction to the typical fraudster identified in the investigations KPMG firms reported on two years earlier. The typical fraudster in the 2013 study is 36 to 45 years of age, is generally acting against his/her own organization, and is mostly employed in an executive,3 finance, operations or sales/ marketing function. He/she holds a senior management position, was employed in the organization in excess of six years and, in committing the fraud, frequently acted in concert with others. Other findings, however, are different. This time, we have developed a series of themes in order to understand the changing relationship among the fraudster, his/ her environment and the frauds committed. And after taking into account the insights of our investigation leaders around the world, we conclude that the type of fraud and the type of fraudster are continually changing. “The intriguing thing about fraud is that it is always morphing, like a strain of flu; you can cure today’s strain, but next year it evolves into something as bad if not worse, ” says Phil Ostwalt, Global Coordinator for Investigations for the Global Forensic practice at KPMG. One major change is the growing use of technology by fraudsters, and not just in the technologically advanced countries, such as the US “a concern for all business is that we are about to see a new generation...

Words: 10259 - Pages: 42

Premium Essay

Mobile Payment

...Mobile payments in Asia Pacific i n f o r m at i o n , c o m m u n i c at i o n s & e nt e rta i n m e nt Mobile payments in Asia Pacific  Contents 2 Introduction from Sean Choi and David Collins 3 Introduction from John Ure and Peter Lovelock 4 Introduction 6 Business models and the m-payments value chain – Business models behind different transaction types – Emerging business models by country – Industry perspectives on m-payments 22 Case studies – Smart in the Philippines – Yeepay’s B2B approach – The growing reach of Octopus – Gaming and virtual money – A view from the bottom of the pyramid – mHITs in Australia 29 Regulations and standards 40 Risks and challenges 44 About KPMG © 2007 KPMG, a Hong Kong partnership and a member firm of the KPMG network of independent member firms affiliated with KPMG International, a Swiss cooperative. All rights reserved. 2 Mobile payments in Asia Pacific Introduction from Sean Choi and David Collins Seung Hwan (Sean) Choi This KPMG thought leadership report explores the development of the market for mobile payment systems in Asia Pacific. We believe the significance of this market cannot be overstated, as new technologies have the potential to play a key role in the expansion of commerce to an ever-wider segment of the world’s population. This is especially true in Asia Pacific. The expansion of commerce and the growing reach of...

Words: 18276 - Pages: 74

Premium Essay

Lauder Global Insights

...impact. A section on consumer markets looks at the popularity of e-cigarettes in France and elsewhere, efforts by Japanese firms to expand their businesses into Asia, new trends in French gastronomy, changes in Japan’s traditional food-consumption habits, and how a sector of the Chinese population is spreading, and spending, its newfound wealth. The report offers an analysis linking market-driven strategies with social impact in Peru and Colombia, as well as an article describing South Carolina’s embrace of innovative research. Other articles look at the Russian government’s attempt to reboot the city of Skolkovo as an innovation hub, the mixed success of innovation efforts in China, and the growing threat of cybercrime to businesses across the world. The challenges of infrastructure and planning are addressed in analyses of transportation in areas of Latin America, deficiencies in Brazil’s infrastructure, and real estate’s impact on Peru’s emerging middle class. Business and politics underpin a number of economic forces, as noted in articles on corruption and protest in India, social unrest in Brazil, the potential of the gemstone tanzanite to help develop Tanzania’s economy, and growing frictions between China and Myanmar. Cities on the move in the global economy are examined in separate articles on...

Words: 56733 - Pages: 227

Premium Essay

Internet and Business

...the expression of any opinion whatsoever on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area or of its authorities, or concerning the delimitation of its frontiers or boundaries. The views expressed do not necessarily represent the decisions or the stated policy of the United Nations. Mention of firm names and commercial products does not imply the endorsement of the United Nations. This publication has been issued without formal editing. ii PREFACE The role of small and medium-sized enterprises (SMEs) in national competitiveness and development, as well as in generating jobs and revenues for countless citizens, is well documented. Their meaningful and useful access to Information and Communications Technologies (ICT), particularly the Internet, will significantly enhance this critical role and will drive demand for and innovation in the ICT sector even more. This set of training modules was therefore developed to serve as a policymaking reference on Internet Use for Business Development, principally for middle- to senior-level Internet policy makers and implementers of public policy issues of Internet governance. More particularly, it is intended as an introductory guide to the various issues and legislative/policy options that developing countries should consider as they put into place the policies and...

Words: 27227 - Pages: 109

Premium Essay

Business Intelligence

...SPECIAL ISSUE: BUSINESS INTELLIGENCE RESEARCH BUSINESS INTELLIGENCE AND ANALYTICS: FROM BIG DATA TO BIG IMPACT Hsinchun Chen Eller College of Management, University of Arizona, Tucson, AZ 85721 U.S.A. {hchen@eller.arizona.edu} Roger H. L. Chiang Carl H. Lindner College of Business, University of Cincinnati, Cincinnati, OH 45221-0211 U.S.A. {chianghl@ucmail.uc.edu} Veda C. Storey J. Mack Robinson College of Business, Georgia State University, Atlanta, GA 30302-4015 U.S.A. {vstorey@gsu.edu} Business intelligence and analytics (BI&A) has emerged as an important area of study for both practitioners and researchers, reflecting the magnitude and impact of data-related problems to be solved in contemporary business organizations. This introduction to the MIS Quarterly Special Issue on Business Intelligence Research first provides a framework that identifies the evolution, applications, and emerging research areas of BI&A. BI&A 1.0, BI&A 2.0, and BI&A 3.0 are defined and described in terms of their key characteristics and capabilities. Current research in BI&A is analyzed and challenges and opportunities associated with BI&A research and education are identified. We also report a bibliometric study of critical BI&A publications, researchers, and research topics based on more than a decade of related academic and industry publications. Finally, the six articles that comprise this special issue are introduced and characterized in terms of the proposed BI&A research framework. Keywords:...

Words: 16335 - Pages: 66

Premium Essay

Bpcl

...SPECIAL ISSUE: BUSINESS INTELLIGENCE RESEARCH BUSINESS INTELLIGENCE AND ANALYTICS: FROM BIG DATA TO BIG IMPACT Hsinchun Chen Eller College of Management, University of Arizona, Tucson, AZ 85721 U.S.A. {hchen@eller.arizona.edu} Roger H. L. Chiang Carl H. Lindner College of Business, University of Cincinnati, Cincinnati, OH 45221-0211 U.S.A. {chianghl@ucmail.uc.edu} Veda C. Storey J. Mack Robinson College of Business, Georgia State University, Atlanta, GA 30302-4015 U.S.A. {vstorey@gsu.edu} Business intelligence and analytics (BI&A) has emerged as an important area of study for both practitioners and researchers, reflecting the magnitude and impact of data-related problems to be solved in contemporary business organizations. This introduction to the MIS Quarterly Special Issue on Business Intelligence Research first provides a framework that identifies the evolution, applications, and emerging research areas of BI&A. BI&A 1.0, BI&A 2.0, and BI&A 3.0 are defined and described in terms of their key characteristics and capabilities. Current research in BI&A is analyzed and challenges and opportunities associated with BI&A research and education are identified. We also report a bibliometric study of critical BI&A publications, researchers, and research topics based on more than a decade of related academic and industry publications. Finally, the six articles that comprise this special issue are introduced and characterized in terms of the proposed BI&A research...

Words: 16335 - Pages: 66

Premium Essay

E-Cah

...A Survey of Electronic Cash, Electronic Banking and Internet Gaming 1 2 TABLE OF CONTENTS PREFACE ..........................................................................................................................5 FOREWORD ..........................................................................................................................7 INTRODUCTION ............................................................................................................... 11 ELECTRONIC CASH .......................................................................................................... 15 INTRODUCTION ................................................................................................... SMART CARDS/STORED VALUE CARDS........................................................ The Basics ..................................................................................................... Stored-Value Card Issuers ............................................................................ COMPUTER E-CASH ............................................................................................ The Basics ..................................................................................................... E-Cash Issuers ............................................................................................... REGULATORY POLICY ......................................................................................... SUMMARY OF ELECTRONIC CASH...

Words: 39311 - Pages: 158

Premium Essay

Scanning Applications

...partners, 2012 was a year that reminded us once again of the seriousness of the security threats facing our nation. During the year, extremists plotted to attack—unsuccessfully, thanks to the work of our Joint Terrorism Task Forces—the U.S. Capitol, the New York Federal Reserve Bank, and other landmarks on U.S. soil. Tragically, on the 11th anniversary of 9/11, a hateful attack in Benghazi took the lives of the U.S. Ambassador to Libya and three other Americans. In the cyber realm, a rising tide of hackers took electronic aim at global cyber infrastructure, causing untold damages. High-dollar white-collar crimes of all kinds also continued to siphon significant sums from the pocketbooks of consumers. And in Newtown, Connecticut, 20 young children and six adults lost their lives in one of the worst mass shootings in American history, ending a year of violence that saw similar tragedies around the country. Working with its colleagues around the globe, the FBI is committed to taking a leadership role in protecting the nation. As you can see from this book—an annual compilation of stories from the FBI’s public website that provides a snapshot of Bureau milestones, activities, and accomplishments—we used the full range of our intelligence, investigative, and operational skills to address major threats during the year. We helped avert terrorist attacks and derail terrorist supporters, put cyber criminals and fraudsters behind bars, and...

Words: 67387 - Pages: 270

Premium Essay

City Cell

...Letter of Transmittal November 28, 2008 Mr. Md. Shibli Shahriar Assistant Professor Department of Business Administration Daffodil International University Subject: Submission of Internship Report Dear Sir, I am very happy to submit my Internship Report assigned to me at the completion of my BBA program. While working on the report, I have tried to follow each and every guideline that you had advised. It has been a very enlightening experience to work on this project and I have thoroughly enjoyed my internship period at CityCell. The authority of Pacific Bangladesh Telecom Limited has also extended their cooperation as and when required. I hope you will accept my report and kindly oblige. Sincerely, Md.Fazlay Elahi Sakib ID:042-11-365, Batch: 8th Bachelor in Business Administration (BBA) Contact:01715909903 Acknowledgement This internship report would not be completed without the help and cooperation of the following people. First of all I would like to thank honorable faculty member and my internship advisor, Mr. Md. Shibli Shahriar, Assistant Professor, BBA program for giving me the permission to work on this topic. My special appreciation and sincere gratitude goes to him for the clear guidelines given, which was very help for me to understand and prepare the structure of the paper. Next, I would like to thank Pacific Bangladesh Telecom Limited authority for their cooperation in doing this project. I would specially like to thank...

Words: 13983 - Pages: 56

Free Essay

Singtel

...& SingTel Annual Report 2014 This Year's Report CoNTENTS overview an overview of our business, providing details on how we performed, key events and achievements from the past year, as well as our strategy moving forward Our Vision and Mission Our Mobile Reach What Differentiates Us Our Strategy An Exciting Year Chairman's Statement GCEO Review 01 02 04 05 06 08 10 12 buSineSS review insight into each of our business units SuSTainabiliTy and governance information on our organisation structure, management team, corporate governance, risk management and sustainability efforts 16 24 30 36 Board of Directors Organisation Structure Management Committee Senior Management Sustainability and Governance Philosophy Corporate Governance Investor Relations Risk Management Philosophy and Approach Sustainability 39 44 45 48 49 50 70 72 80 Group Consumer Group Enterprise Group Digital L!fe Key Awards and Accolades performance our performance at a glance financialS audited financial statements for the year ended 31 march 2014 89 91 92 Directors’ Report Statement of Directors Independent Auditors’ Report Consolidated Income Statement Consolidated Statement of Comprehensive Income Statements of Financial Position Statements of Changes in Equity Consolidated Statement of Cash Flows Notes to the Financial Statements 102 110 111 112 113 114 116 120 123 addiTional informaTion Shareholder and corporate information, as well as contact points for our offices worldwide...

Words: 84138 - Pages: 337

Premium Essay

Cellular Effects

...Technology and Society Today , Political & Economic ., Health, Psychological & Sociological , Cellular Technology & History , Moral & Sociological DeVry University LAS432 Society, Ethics, and Technology   Abstract The following paper will discuss the psychological and sociological impact of cellular technology. Cellular technology has seen rapid growth in technology and in personal use. Texting has now become the dominant means of communication and actual conversation skills are diminishing. Exposure to electromagnetic radiation emitted from cellular devices has become a concern and is being studied from many various angles to determine actual health risks from cell phone use. Whether it is for personal or business use, the cell phone has become a permanent fixture in our lives, could have potential health risks, and can become an addiction if necessary steps are not taken to control use and dependency.   Cellular Technology and Society Today At any store they are visible. They have their hand plastered to their ear or they are seemingly talking to no one. These are the cellphone users. Hayley Tsukayama, a writer for the Washington post asserts that according to the Pew Internet and Life Project only seventeen percent of Americans still have a land line and ninety percent own a cellphone. (Tsukayama, 2014) The largest contributor to this trend is convenience. Most cellular devices are small and easily portable, allowing the user to move around freely. The ability...

Words: 19048 - Pages: 77

Free Essay

2009-Report to Congress of the Us-China E and S Review Commission

...with K1 VerDate Nov 24 2008 08:23 Nov 10, 2009 Jkt 052771 PO 00000 Frm 00003 Fmt 6012 Sfmt 6602 M:\USCC\2009\52771.XXX APPS06 PsN: 52771 M:\USCC\USChina.eps Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 3. DATES COVERED 2. REPORT TYPE 01 NOV 2009 4. TITLE AND SUBTITLE 00-00-2009 to 00-00-2009 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 2009 Report to Congress of the U.S-China Economic and Security Review Commission 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) U.S.-China Economic and...

Words: 185166 - Pages: 741

Premium Essay

Strategic Management

...Course Team Coordinator: Dr. Chuah Poh Lean Content Writer: Dr. Hasliza Abdul Halim Instructional Designer: Mr. Khoo Chiew Keen Academic Member: Ms Lum Li Sean COURSE COORDINATOR Ms. Loo Saw Khuan EXTERNAL COURSE ASSESSOR Associate Professor Dr. Haji Hamzah Dato Abdul Rahman, Universiti Utara Malaysia. PRODUCTION Editor: Pelangi Sdn. Bhd. In-house Editor: Mr. Khoo Chiew Keen Graphic Designer: Deam Enterprise Wawasan Open University is Malaysia’s first private not-for-profit tertiary institution dedicated to adult learners. It is funded by the Wawasan Education Foundation, a tax-exempt entity established by the Malaysian People’s Movement Party (Gerakan) and supported by the Yeap Chor Ee Charitable and Endowment Trusts, other charities, corporations, members of the public and occasional grants from the Government of Malaysia. The course material development of the university is funded by Yeap Chor Ee Charitable and Endowment Trusts. © 2013 Wawasan Open University All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior written permission from WOU. Wawasan Open University (KPT/JPT/DFT/US/P01) Wholly owned by Wawasan Open University Sdn. Bhd. (700364-W) 54, Jalan Sultan Ahmad Shah, 10050 Penang. Tel: (604) 2180333 Fax: (604) 2279214 Email: enquiry@wou.edu.my Website: www.wou.edu.my ...

Words: 23866 - Pages: 96

Free Essay

Globalization

...GLOBALIZATION THE ESSENTIALS GEORGE RITZER A John Wiley & Sons, Ltd., Publication Globalization Globalization A Basic Text George Ritzer This balanced introduction draws on academic and popular sources to examine the major issues and events in the history of globalization. Globalization: A Basic Text is a substantial introductory textbook, designed to work either on its own or alongside Readings in Globalization. The books are cross-referenced and are both structured around the core concepts of globalization. 2009 • 608 pages • 978-1-4051-3271-8 • paperback www.wiley.com/go/globalization Readings in Globalization Key Readings and Major Debates Edited by George Ritzer and Zeynep Atalay This unique and engaging anthology introduces students to the major concepts of globalization within the context of the key debates and disputes. Readings in Globalization illustrates that major debates in the field are not only useful to examine for their own merit but can extend our knowledge of globalization. The volume explores both the political economy of globalization and the relationship of culture to globalization. The volume is designed so it may be used independently, or alongside George Ritzer’s Globalization: A Basic Text for a complete student resource. 2010 • 560 pages • 978-1-4051-3273-2 • paperback Order together and save! Quote ISBN 978-1-4443-2371-9 GLOBALIZATION THE ESSENTIALS GEORGE RITZER A John Wiley & Sons, Ltd., Publication This edition first...

Words: 168078 - Pages: 673

Premium Essay

Forces of Change & Accompanying Values

... The Forces for Change is a framework to help you understand today’s radically changing world and synthesize the breadth of complex, fast changing, interdependent factors  Are all changes bad? Change can be uncomfortable and awkward but it can also be positive. FORCES OF CHANGE AND THEIR ACCOMPANYING VALUES FORCES OF CHANGE & ACCOMPANYING VALUES Turbulence Intellectual capital, Intellectual propert, ,information sharing Networking, innovation, R&D INFORMATION AGE K-Economy GLOBALIZATION DEVELOPMENT Autonomy, Pride, Dignity Independence, Indigenization “CultureBound” Customer Focus; Speed, Responsiveness; Continuous Learning; Accurate & Up-To-Date Information Quality; Value Added; Cost Effectiveness; Humanization; Ecological Specialisation; Objectivity; Materialism; SystemsOrientation MODERNIZATION WESTERNIZATION Individualism; Secularism; Freedom Of Expression; Consumerism INDUSTRIALIZATION Mechanization; Rational Thinking; Bureaucracy; Efficiency; Productivity; Mobility; Discipline; Mechanical Time Orientation; Reliability Stable 1800 AGRICULTURAL Revolution Time line Simple division of labor, labor intensive, Collectivism, sharing 2000 FORCES OF CHANGE & ACCOMPANYING VALUES Turbulence Intellectual capital, Intellectual propert, ,information sharing Networking, innovation, R&D INFORMATION AGE K-Economy GLOBALIZATION DEVELOPMENT Autonomy, Pride, Dignity Independence, Indigenization “CultureBound” Customer Focus; Speed...

Words: 23543 - Pages: 95