Smart city systems are becoming more and more widespread in the nearest future. Their deployment allows focusing on combining diverse and varied urban information systems into a single sustainable, energy-efficient, low carbon energy, wasteless, clean "ecosystem" which will be friendly and comfortable for its citizens. This system integrates into itself all existing city IT-systems from individual smartphones to complex urban traffic management systems. And the practice shows that the IT-systems of the smart city do not yet sufficiently meet requirements of security and protection from attacks, malware and external threats. In this respect, the Ukrainian epidemic of ransomware WannaCry and Petya presents a good example. It wasn't targeted attack, ransomware wasn't directed or aimed at any of metropolitan or urban infrastructure it-systems, but as a result of collateral damage, more than a third of Ukrainian computer networks (including banking and state ones) were disabled. There is also a significant and growing demand for a targeted attack against industrial and urban infrastructure. Currently, cases of the following attacks are already known and considered in detail: the malicious computer worm Stuxnet which targets industrial systems and is believed to be responsible for causing substantial damage to the nuclear program of Iran and related malware as Duqu and Flame, Triton/Trisis malware which the first appearance was at a petrochemical plant in 2017, and was aimed at attacking the "last line of defense" - safety instrumented systems (SIS) of Schneider Triconex. Thus, it was only a matter of time before smart city faces IT-infrastructure attack. The paper considers sources of threats and the reasons for the weak security of smart city IT-systems including the following: an increase of the attack surface, the lack of a unified strategy and security service, the developers' emphasis on simplicity and ease of systems deployment at the expense of security, a large percentage of wireless technologies that facilitate access to critical infrastructure objects, the presence of obsolete and legacy code sections in the system. The article proposes a set of measures and actions for smart city IT-systems hardening. Also, the paper considers redundancy and inefficiency of old protection methods and measures such as "air gap", proprietary protocols, "secure by obscure" and others. Keywords: smart city, information ecosystems, cybersecurity, municipal economy, risks, threats, incidents, protection.
The paper analyzes possible risks and threats posed by the transition from modern cities to smart cities. The concept and scheme of doxing implementation are analyzed. Moreover, the essence of deanonymization is revealed and threats to the privacy and security of smart city residents associated with these processes are identified. Furthermore, the reasons for the growth of doxing practice are clarified. The social aspect of the cybersecurity of a smart city is seen primarily in the increased risks of privacy disclosure, which can lead to deanonymization, which can later be used for doxing, cyberbullying, blackmail or social engineering schemes. This demands that personal data must not only be protected by reliable cryptographic and technical measures but also - where it allows by work tasks - be specifically or partially impersonalised. Also, when planning personal data protection in smart city informational ecosystems, it should be considered that such protection will be existing in the context of an overall eco-information system of the city. Therefore, the one's always set priorities balanced between data protection, identify threats, measures and mechanisms for their implementation and daily routine tasks of system administration. The article analyzes cases and schemes of deanonymization, shows the vulnerability of modern information and communication systems to obtain data that can be used by an attacker. Based on the analysis and taking into account the specifics of the functioning of information ecosystems of smart cities, the main recommendations for protecting data stored in information systems are developed and systematized, which will reduce the risks of hacking such data and minimize harm from deanonymization and doxing. Finally, the authors proved that deanonymization is a sequential hacking process, and doxing is a hacking process and publishing private information. Such information can be obtained by collecting and analyzing open ("white"), stolen ("black") and stolen by third parties, but conditionally freely available ("Gray") sources of information. With the development of the smart city infrastructure, the amount of information collected, stored and processed will grow. This will lead to an increase in the "digital footprint" of every user of information system, that is, almost everyone who lives in the city.
Relevance. Among the main problems of modern agriculture, the problem of reducing the biological yield of agricultural crops is particularly prominent. One of the most cost-effective solutions to this issue may be the use of organic fertilizers. Zoo compost is a type of organic fertilizer that is a product of the vital activity of fly larvae. To confirm the results of the suitability of zoo compost as an organic fertilizer, a field experiment was conducted.Results. It has been experimentally established that the zoo compost of Black lion fly larvae increases the survival rate of tomato plants, positively affects the growth of tomato plants, and accelerates fruit maturation. It has a positive effect on the formation of tomato fruits and yield. Analyzing the data obtained from the accounting area of the plot, we can conclude that the yield increase in relation to the control was in the range of 1.859–2.375 kg. It should be noted that the maximum yield increase was obtained by applying a double dose of zoo compost (2 tons per ha).
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.