megha sharma
TRANSCRIPT
![Page 1: Megha Sharma](https://reader033.vdocuments.us/reader033/viewer/2022042520/58756b091a28abd80a8b62cf/html5/thumbnails/1.jpg)
![Page 2: Megha Sharma](https://reader033.vdocuments.us/reader033/viewer/2022042520/58756b091a28abd80a8b62cf/html5/thumbnails/2.jpg)
SMART Cities:ConceptIts not so generic
2
![Page 3: Megha Sharma](https://reader033.vdocuments.us/reader033/viewer/2022042520/58756b091a28abd80a8b62cf/html5/thumbnails/3.jpg)
Smart City Architecture» Multitier architecture comprising of 4 layers:1. User Layer2. Service Layer3. Infrastructure Layer4. Data Layer
3
![Page 4: Megha Sharma](https://reader033.vdocuments.us/reader033/viewer/2022042520/58756b091a28abd80a8b62cf/html5/thumbnails/4.jpg)
Types of Cities:1. Web or Virtual City2. Knowledge-based City3. Broadband City4. Mobile or Ambient City5. Digital City6. Smart or Intelligent City7. Ubiquitous City8. Eco City
4
![Page 5: Megha Sharma](https://reader033.vdocuments.us/reader033/viewer/2022042520/58756b091a28abd80a8b62cf/html5/thumbnails/5.jpg)
Key Areas:
Smart CitySmart City
Smart EnergySmart Energy
Open DataOpen DataSmart TransportSmart Transport5
![Page 6: Megha Sharma](https://reader033.vdocuments.us/reader033/viewer/2022042520/58756b091a28abd80a8b62cf/html5/thumbnails/6.jpg)
Implementation Challenges
6
![Page 7: Megha Sharma](https://reader033.vdocuments.us/reader033/viewer/2022042520/58756b091a28abd80a8b62cf/html5/thumbnails/7.jpg)
Smart EnergySmart EnergyData ConfidentialityData Confidentiality
Data UsageData Usage
Access ControlsAccess ControlsTamper Resistance and Non-repudiation
Tamper Resistance and Non-repudiation
AvailabilityAvailability
Transparent Auditing & VerifiabilityTransparent Auditing & Verifiability
7
![Page 8: Megha Sharma](https://reader033.vdocuments.us/reader033/viewer/2022042520/58756b091a28abd80a8b62cf/html5/thumbnails/8.jpg)
Smart TransportSmart TransportTraffic Safety & AccidentsTraffic Safety & Accidents
ScalabilityScalability
Seamless ServicesSeamless Services Heterogeneity Heterogeneity
VolatilityVolatility
Secure PositioningSecure Positioning
8
![Page 9: Megha Sharma](https://reader033.vdocuments.us/reader033/viewer/2022042520/58756b091a28abd80a8b62cf/html5/thumbnails/9.jpg)
Open DataOpen Data
AccuracyAccuracy
TrustTrust
Adverse Effect on Open GovernmentAdverse Effect on Open Government AccessibilityAccessibility
Unintentional Privacy ViolationUnintentional Privacy Violation
Violating LegislationViolating Legislation
9
![Page 10: Megha Sharma](https://reader033.vdocuments.us/reader033/viewer/2022042520/58756b091a28abd80a8b62cf/html5/thumbnails/10.jpg)
Risk Assessment
10
![Page 11: Megha Sharma](https://reader033.vdocuments.us/reader033/viewer/2022042520/58756b091a28abd80a8b62cf/html5/thumbnails/11.jpg)
Risk Matrix:Risk = Impact (Severity of threat) X Likelihood (Probability of the risk)
11
Likelihood/Impact Extreme 5 Major 4 Moderate 3 Minor 2 Insignificant 1Almost Certain 5 25 20 15 10 5Probable 4 20 16 12 8 4Possible 3 15 12 9 6 3Unlikely 2 10 8 6 4 2Rare 1 5 4 3 2 1
![Page 12: Megha Sharma](https://reader033.vdocuments.us/reader033/viewer/2022042520/58756b091a28abd80a8b62cf/html5/thumbnails/12.jpg)
12
05
10152025
Smart Energy Risk factor
![Page 13: Megha Sharma](https://reader033.vdocuments.us/reader033/viewer/2022042520/58756b091a28abd80a8b62cf/html5/thumbnails/13.jpg)
13
05
10152025
Smart Transport Risk factor
![Page 14: Megha Sharma](https://reader033.vdocuments.us/reader033/viewer/2022042520/58756b091a28abd80a8b62cf/html5/thumbnails/14.jpg)
14
05
10152025
Smart Data Risk Factor
![Page 15: Megha Sharma](https://reader033.vdocuments.us/reader033/viewer/2022042520/58756b091a28abd80a8b62cf/html5/thumbnails/15.jpg)
Cost vs. Control
15
![Page 16: Megha Sharma](https://reader033.vdocuments.us/reader033/viewer/2022042520/58756b091a28abd80a8b62cf/html5/thumbnails/16.jpg)
» The possibility of occurrence of a security event is inversely proportional to the expenditure justified for ISMS control. » Sensor Networks forms the base of a smart city.» Software patch management for sensor networks is a daunting task.» IDS/IPS as a first line of defense for sensor networks is challenging.
16
![Page 17: Megha Sharma](https://reader033.vdocuments.us/reader033/viewer/2022042520/58756b091a28abd80a8b62cf/html5/thumbnails/17.jpg)
Conclusion: Cyber-attacks , Malware and Availability are the major threats for a smart city Applying controls to the network and communication technologies is the most cost intensive countermeasure strategy Smart energy is most vulnerable with most of the threats posing high risk to the assets
17