Top Banner
Charles Mok Legislative Councillor (Information Technology)
16
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Security of Cloud Computing Applications in Smart Cities

Charles Mok

Legislative Councillor

(Information Technology)

Page 2: Security of Cloud Computing Applications in Smart Cities
Page 3: Security of Cloud Computing Applications in Smart Cities

An evolution of Smart Cities

Making cities more efficient

but also

more vulnerable

Page 4: Security of Cloud Computing Applications in Smart Cities

4

New economic and social

opportunities from the

Internet of Things

Page 5: Security of Cloud Computing Applications in Smart Cities

Smart Services:

Interconnected data,

infrastructures and services,

enabled by ICT

5

Page 6: Security of Cloud Computing Applications in Smart Cities

SMART CITY ARCHITECTURE

Applications satellite imagery, aerial mapping, GPS, building management

system, CCTV, GIS

Information user, document, industry, business, revenue, circulation

Management

Integration of communication protocols Wireless, Bluetooth, Wi-Fi, 3/4/5G, M2M, embedded network

6

Page 7: Security of Cloud Computing Applications in Smart Cities

7

Intelligent street lighting

Intelligent building

Intelligent transportation

Smart transit

Page 8: Security of Cloud Computing Applications in Smart Cities

8

SMART CITIES PRESENT

AND CONTAIN VALUABLE

INFORMATION

LARGE-SCALE HAVOC

THROUGH DISRUPTIONS

AND DAMAGE

Page 9: Security of Cloud Computing Applications in Smart Cities

SECURITY IN SMART CITIES

9

SECURITY

BREACH PRIVACY

CYBER-

ATTACKS HACKING

DATA THEFT

Page 10: Security of Cloud Computing Applications in Smart Cities

MAIN CAUSES OF DATA BREACHES

10

System glitches Malicious attacks Human factor

29% 36% 35%

Source: 2013 Cost of Data Breach Study: Global Analysis“

by Symantec and the Ponemon Institute.

Page 11: Security of Cloud Computing Applications in Smart Cities

11

Source: Techcrunch

Page 12: Security of Cloud Computing Applications in Smart Cities

3 KEY ISSUES

Security

Is the data protected from theft, leakage,

spying or attacks?

What is the level of control and

protection?

Residency

Where is the data stored?

geographically disbursed?

What to do with data in transit & outside territory?

Privacy

Who can see personally identifiable

information (PII)?

Storing, transferring, locating and protecting PII

Page 13: Security of Cloud Computing Applications in Smart Cities

13

GOOD SECURITY PRACTICE AND

CENTRALISED DATA COLLECTION

& MANAGEMENT

Page 14: Security of Cloud Computing Applications in Smart Cities

PLANNING AHEAD:

STRATEGIC APPROACH

Multiple layers:

Physical security (facilities)

Network security (infrastructure)

System security (IT systems)

Application and data security

Page 15: Security of Cloud Computing Applications in Smart Cities

SECURITY BY DESIGN

• Identify critical data and risk entry points

• Identification and Access controls

• Encryption key management

• Disaster Recovery and Continuity

• Breach notification and data residency

• Data management at rest

• Data protection in motion

• Long-term resiliency of the encryption system

• Educate people, improve governance and compliance

15

Page 16: Security of Cloud Computing Applications in Smart Cities

16