Smart cities could be facing major cyberattack risk

smart city
(Image credit: Jamesteohart / Shutterstock)

A new document published by the National Cyber Security Centre (NCSC) says that local authorities will need to prepare themselves for the security challenges that come with the move toward smart, connected cities.

Smart cities are often described as urban areas that rely on a host of connected sensors that are constantly collecting and sharing data, with each other, as well as the authorities, in order to solve the many urban challenges of today, such as traffic congestion. 

However, the NCSC argues that since smart cities rely on moving, processing, and storing sensitive data, and controlling critical operational technology, it makes them an attractive target for threat actors.

TechRadar needs you!

We're looking at how our readers use VPN for a forthcoming in-depth report. We'd love to hear your thoughts in the survey below. It won't take more than 60 seconds of your time.

>> Click here to start the survey in a new window<<

In light of this, the NCSC has published a guidance document to help authorities understand the security considerations that are required not just to design, build, and manage the smart cities, but also to protect critical public services from any cyber disruption. 

“It [the guidance] recommends a set of cyber security principles that will help ensure the security of a connected place and its underlying infrastructure, so that it is both more resilient to cyber attack and easier to manage,” reads the guidance.

Reel to real

In a blog post about the guidance document, NCSC's technical director, Dr Ian Levy, writes that one of the first Hollywood depictions of a cyber attack was against critical infrastructure.

Leveraging the fictional attack against a city’s traffic management system in the 1969 film The Italian Job, Levy writes that a similar attack on a modern, smart, connected city would be “catastrophic” for its residents.

“Failures within individual systems can have terrible impacts, but as they are increasingly connected and become interdependent, the compound effects are magnified,” writes Levy.

Levy hopes the principles laid out in the document will help the stakeholders make informed decisions, from a cybersecurity point of view, when planning a smart connected place. 

Via BBC

Mayank Sharma

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.

Read more
A graphic showing fleet tracking locations over a city.
How smart cities leverage AI to integrate services and improve efficiency
Representational image of a hacker
The 10 worst software disasters of 2024: cyberattacks, malicious AI, and silent threats
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Fortifying the UK’s energy sector: The cybersecurity imperative in an AI-driven future
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Sounding the alarm on AI-powered cybersecurity threats in 2025
An image of network security icons for a network encircling a digital blue earth.
Why effective cybersecurity is a team effort
Abstract image of cyber security in action.
It’s time to catch up with cyber attackers
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Apple iPhone 16 Review
The latest iPhone 18 leak hints at a major chipset upgrade for all four models
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Sunday, March 23 (game #385)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Sunday, March 23 (game #651)
Google Pixel 9 Pro Fold main display opened
Apple is rumored to be prioritizing battery life on the foldable iPhone – which could also feature a liquid metal hinge for added durability
Google Pixel 9
The Google Pixel 10 just showed up in Android code – and may come with a useful speed boost