Securing Smart Cities releases guideline to protect The Olympic Games

Information Technology Press Releases Tuesday February 13, 2018 09:37
Bangkok--13 Feb--kaspersky+Lab

Without the Olympics, there would be no means of fostering the quick growth of various technologies. Multiple technological areas have witnessed growth because of these elite Games including; cyber security, smart cities, smart transportation systems, big data revolution, waste recycling, and player tracking and monitoring systems. The Games are the catalyst that make scientists, engineers, and other experts come up with improved products that can be displayed to millions of people and that lead to healthy and more productive lifestyles. With extensive cyber security planning, the Olympics are being kept safe and the framework is in place to ensure that it matches global deployment requirements. Can the Olympics keep up with the challenges and keep the technological evolution going?

Research shows that there is much at stake, from critical infrastructure to healthcare or environmental issues. All of these should be properly managed in the pursuit of a bright future. Figures support this concern. At the 2008 Beijing Games, around 190 million cyber-attacks were reported (12 million per day). At the 2012 London Games, cybercriminals made over 200 million failed attacks on the event's official website. At the 2014 Sochi Olympics, 322 million attacks were reported, followed by 570 million at the 2016 Rio Olympics.

What are the most likely attack vectors at the upcoming Olympics? Here is what the Securing Smart Cities experts think:
? Cyber-attacks on online services for ticketing, reservations, seating, hotels, transport services and food orders (compromise or denial of service)
? Cyber-attacks on authentication and authorization systems (onsite access control accuracy)
? Attacks on robotic machinery, by disabling them or controlling them remotely.

? Attacks on cyber physical operational technologies: Heating, ventilation, and air conditioning (HVAC), elevators, emergency lighting, traffic signals, water treatment facilities, sewage pumps, monitoring drones and cameras...

? Attacks on employees and attendees of the games (phishing, hacking, remote monitoring or data manipulation, blackmailing...)
? Attacks on country infrastructure, water treatment/distribution, power/electricity, transport/airlines, banking, e-government services
? Attacks and manipulation of judges/judging systems, data and/or scoring decisions
? Attacks and manipulation of athlete monitoring (performance enhancement drugs) or monitoring sensors (which are used to enhance their exercising programs and their results)
? Manipulation of data analytics systems and algorithms (which help predict traffic, population density, weather, water/power/storage demands...)
? The spreading of rumors on social media can also significantly impact the Olympics. Fake profiles can post fake messages that can start crowd panics or similar troubles.

Mohamad Amin Hasbini, Senior Security Researcher at Kaspersky Lab, comments: "At every Olympic event, we usually witness a showcase of amazing and futuristic technologies to channel communications, enhance the user experience, and ensure the success of every event. Because of the extensive use of technology at the games, it has attracted a high number of hackers trying to find a way of breaking the systems and causing havoc. This creates a situation where cyber security challenges are not only an issue of safety, but also provide the opportunity to demonstrate to the world that we are able to successfully combat the threats around us."


Latest Press Release

China Unicom and ZTE Complete the World#s First 5G Call with ZTE#s 5G Prototype Smartphone

ZTE Corporation (0763.HK / 000063.SZ), a major international provider of telecommunications, enterprise and consumer technology solutions for the Mobile Internet, today announced that the Guangdong branch of China Unicom and ZTE have made the world's...

Transcend Introduces Ultra Slim Portable Storage StoreJet 25C3S in a Stylish Aluminum design

Transcend Information, Inc. (Transcend ), a leading manufacturer of storage and multimedia products, is proud to introduce the StoreJet 25C3S as the latest addition to its StoreJet Luxury series. Featuring a luxury aluminum alloy housing with a USB 3.1...

HONOR Sees Strong Growth Amid Global Industry Decline

Flagship HONOR View20 Soon to be Launched Globally, Paving the Way to a Powerful Start of 2019 HONOR, a leading smartphone e-brand, has cemented its leading industry position with strong growth in 2018, despite a global industry downturn. According to...

Agile Alliance to Host Agile India 2019

Agile Alliance announced today it is hosting Agile India 2019, the largest international premier conference on Agile and Lean Software Development methods in Asia. The annual event, scheduled for March 17 - 24 in Bengaluru, India, brings together...

True plans not to participate in the 700MHz spectrum auction, awaiting more clarity on the 900mhz payment extension

In response to the news about the 700MHz spectrum auction, True does not plan to participate as the Company is awaiting more clarity on the 900MHz payment extension. According to Mr. Vichaow Rakphongphairoj President (Co) True Corporation Plc. "True...

Related Topics