Incident: Smart City Vulnerability to Cyber Attacks Due to Lack of Security Testing

Published Date: 2015-05-13

Postmortem Analysis
Timeline 1. The software failure incident mentioned in the article happened in April 2015. [Article 36264]
System The software failure incident discussed in the article highlights vulnerabilities in smart city systems due to inadequate security measures. The systems/components that failed in this incident are: 1. Smart city systems lacking proper security measures, including encryption [36264] 2. Traffic control sensors installed worldwide, such as those in Melbourne and London, being vulnerable to attacks from hackers [36264] 3. Smart power meters being hacked, allowing tech-savvy users to reprogram them and get energy for free [36264]
Responsible Organization 1. Lack of security testing by city authorities and governments when purchasing smart systems, trusting vendors instead [36264] 2. Failure of many firms selling smart systems to build in effective security measures like encryption, making the systems vulnerable to attacks [36264] 3. Some internet of things vendors not allowing security researchers to test their products, hindering the identification of software flaws and vulnerabilities [36264]
Impacted Organization 1. City authorities and governments that are the customers of technology firms [36264] 2. Utility firms affected by the smart power meter hack investigated by the FBI [36264]
Software Causes 1. Lack of proper security testing by city authorities and governments when purchasing smart systems [36264] 2. Failure of many firms selling smart systems to build in effective security measures such as encryption [36264] 3. Vulnerability of traffic control sensors installed worldwide to attacks from hackers [36264] 4. Smart power meter hack allowing tech-savvy users to reprogram the meter and get energy for free [36264]
Non-software Causes 1. Lack of proper security testing by city authorities and governments when purchasing smart city technology [36264]. 2. Failure of many firms selling smart systems to build in effective security measures such as encryption [36264]. 3. Some internet of things vendors not allowing security researchers to test their products, viewing security research as a threat [36264]. 4. Delay in pushing out software updates to city-wide systems even after identifying security flaws [36264].
Impacts 1. The software failure incident in smart cities led to increased vulnerability to hackers, as highlighted by internet security researcher Cesar Cerrudo [36264]. 2. The lack of proper security measures in smart systems, such as encryption, made data transmitted wirelessly susceptible to capture by unauthorized individuals, compromising security [36264]. 3. The vulnerability of traffic control sensors to cyber attacks exposed a significant security flaw in the smart city infrastructure [36264]. 4. The incident of smart power meter hacks investigated by the FBI resulted in potential financial losses for utility firms due to tech-savvy users reprogramming meters to get energy for free [36264]. 5. Some vendors selling internet of things products were reluctant to allow security researchers to test their products, hindering the identification and mitigation of software flaws [36264]. 6. The delay in pushing out updates to city-wide systems after identifying security issues left smart cities open to potential attacks for extended periods [36264].
Preventions 1. Governments should be more responsible when purchasing smart city solutions, ensuring that security systems are thoroughly tested and effective [36264]. 2. Implementing proper security measures such as encryption for wireless data transmission to prevent data interception by hackers [36264]. 3. Establishing a Computer Emergency Response Team (CERT) in every city to handle security incidents, ensure vendors fix flaws, and conduct penetration tests on systems [36264].
Fixes 1. Governments need to be more responsible when purchasing smart city solutions, ensuring they understand security systems and require security testing from vendors [36264]. 2. Cities should establish a Computer Emergency Response Team (CERT) to handle attacks, vulnerabilities, and ensure vendors fix flaws in smart city systems [36264].
References 1. Cesar Cerrudo, chief technology officer at security research firm IOActive Labs [36264] 2. Sean Sullivan, security analyst at F-Secure [36264] 3. James Lyne, global head of security research at Sophos [36264]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident having happened again at one_organization: - The article discusses how smart cities are vulnerable to hackers due to lack of proper security measures in the technology they use, such as traffic control sensors vulnerable to attacks [36264]. - It is mentioned that some vendors of internet of things products are not allowing security researchers to test their products, even when researchers are willing to buy them, indicating a lack of transparency and security testing [36264]. (b) The software failure incident having happened again at multiple_organization: - The article mentions that smart cities around the world, from Melbourne to London, have vulnerable traffic control sensors that are susceptible to attacks from hackers, indicating a widespread issue across different cities [36264]. - The article also highlights a smart power meter hack investigated by the FBI that could be costing utility firms millions, suggesting that similar vulnerabilities may exist in power meter systems used by different utility companies [36264].
Phase (Design/Operation) design, operation (a) The article discusses the vulnerability of smart city systems to hackers due to the lack of proper security measures during the design and development phases. It mentions that many city authorities and governments do not conduct security testing on the systems they buy, trusting the vendors instead [36264]. Additionally, it highlights that some vendors of internet of things products do not allow security researchers to test their products, indicating a lack of emphasis on security during the development phase [36264]. (b) The article also touches upon the potential for software failure incidents related to operation. It mentions a smart power meter hack investigated by the FBI that allowed tech-savvy users to reprogram the meter and get energy for free, indicating a failure in the operation or use of the system [36264]. Additionally, it discusses the need for cities to have a Computer Emergency Response Team (CERT) to handle attacks or vulnerabilities, suggesting a focus on operational aspects of security [36264].
Boundary (Internal/External) within_system, outside_system (a) within_system: The software failure incident discussed in the articles is primarily related to failures within the system. The articles highlight that smart cities, with their interconnected technologies like traffic lights, smart meters, and public transport systems, are vulnerable to cyber attacks due to inadequate security measures within the systems themselves. For example, the lack of proper security testing, encryption, and vulnerability of traffic control sensors to hackers are all internal system issues [36264]. Additionally, the articles mention that some vendors of internet of things products are not allowing security researchers to test their products, indicating a lack of internal security measures within these systems [36264]. (b) outside_system: While the articles focus on failures within the system, they also touch upon the external factors contributing to the software failure incident. One key external factor mentioned is the lack of responsibility on the part of governments and city authorities when purchasing smart city solutions. They often prioritize features over security, relying on vendors without ensuring proper security measures are in place [36264]. This external factor of negligence in decision-making contributes to the vulnerability of smart city systems to cyber attacks originating from outside the system.
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident occurring due to non-human actions: - The article discusses how smart cities, with their interconnected systems and devices, are vulnerable to hackers due to lack of proper security measures such as encryption [36264]. - It mentions that the 200,000 traffic control sensors installed worldwide were vulnerable to attacks from hackers [36264]. - The article also highlights a smart power meter hack investigated by the FBI that allowed tech-savvy users to reprogram the meter and get energy for free, costing utility firms millions [36264]. (b) The software failure incident occurring due to human actions: - The article points out that city authorities and governments purchasing technology for smart cities often do not conduct security testing on the systems they buy, trusting the vendors instead [36264]. - It mentions that some vendors selling internet of things products are reluctant to let security researchers test their products, viewing security research as a threat [36264]. - The article also discusses the challenge of pushing out security updates to city-wide systems, with some companies taking months or even years to address identified software flaws [36264].
Dimension (Hardware/Software) software (a) The articles do not specifically mention any software failure incident occurring due to contributing factors originating in hardware. Therefore, there is no information available regarding a software failure incident related to hardware in the provided articles. (b) The articles discuss software failure incidents related to security vulnerabilities in smart city systems. The incidents are attributed to contributing factors originating in software, such as the lack of proper security measures like encryption in smart systems [36264]. The vulnerabilities in software systems, including traffic control sensors and smart power meters, were highlighted as potential targets for hackers, leading to security risks in smart cities.
Objective (Malicious/Non-malicious) malicious (a) The software failure incident discussed in the articles is related to malicious intent. The articles highlight the vulnerability of smart city systems to hackers and cyber attacks. Security researchers have warned that smart cities are highly hackable and could be targeted by malicious actors for various purposes, including fraud and causing chaos. For example, the articles mention vulnerabilities in traffic control sensors and smart power meters that could be exploited by hackers [36264]. Additionally, there are concerns about the lack of security testing by city authorities and governments when purchasing smart city solutions, leaving these systems open to attacks [36264].
Intent (Poor/Accidental Decisions) poor_decisions, accidental_decisions The articles discuss software failure incidents related to poor decisions and accidental decisions: (a) poor_decisions: The articles highlight that city authorities and governments purchasing smart city solutions are not testing the security of the systems they buy. They focus more on functionality testing rather than security testing, trusting the vendors to provide secure systems [36264]. (b) accidental_decisions: The articles mention that some vendors selling internet of things products are not allowing security researchers to test their products, even when researchers are willing to buy them. This lack of collaboration with security researchers can lead to unintentional vulnerabilities in the software [36264].
Capability (Incompetence/Accidental) development_incompetence, accidental (a) The article highlights the issue of software vulnerabilities in smart city systems due to the lack of security testing by city authorities and governments. Cesar Cerrudo, a security researcher, pointed out that many firms selling smart systems fail to incorporate effective security measures like encryption, making the systems vulnerable to attacks [36264]. (b) The article mentions a smart power meter hack investigated by the FBI that allowed tech-savvy users to reprogram the meter and get energy for free, potentially costing utility firms millions. This incident could be considered accidental as it was likely not intended by the utility firms [36264].
Duration permanent, temporary The articles discuss the potential vulnerabilities and security risks associated with smart city technologies. These risks could lead to software failure incidents that may be either permanent or temporary. 1. Permanent Failure: The articles highlight the lack of proper security measures in smart city technologies, such as the absence of encryption in wireless data transmission, making them vulnerable to attacks [36264]. This lack of security could lead to permanent software failure incidents if exploited by hackers, compromising the integrity and functionality of the systems. 2. Temporary Failure: The articles also mention the possibility of temporary disruptions caused by hackers, such as pranks or one-day outages on transport systems that could cause chaos [36264]. These temporary disruptions may not result in a permanent failure but can still impact the normal operation of smart city services. Therefore, the software failure incidents related to smart city technologies could range from temporary disruptions caused by specific circumstances to permanent failures resulting from broader security vulnerabilities.
Behaviour crash, omission, value, other (a) crash: The articles mention vulnerabilities in smart city systems that could lead to crashes or outages in transport systems causing chaos [36264]. (b) omission: The software failure incident related to the smart city systems could lead to omission of performing intended functions, such as the vulnerability of traffic control sensors to attacks from hackers [36264]. (c) timing: The articles do not specifically mention any software failure incident related to timing issues. (d) value: The software failure incident could lead to the system performing its intended functions incorrectly, as seen in the example of a smart power meter hack allowing users to reprogram the meter and get energy for free, costing utility firms millions [36264]. (e) byzantine: The articles do not specifically mention any software failure incident related to byzantine behavior. (f) other: The software failure incident could involve other behaviors not explicitly mentioned in the options, such as security vulnerabilities in smart city systems that could lead to fraud, pranks, or compromise of security [36264].

IoT System Layer

Layer Option Rationale
Perception sensor, processing_unit, network_communication, embedded_software The articles discuss various aspects related to the security vulnerabilities in smart city systems, which could potentially lead to software failure incidents: (a) sensor: The articles mention that 200,000 traffic control sensors installed around the world were vulnerable to attack from hackers, highlighting a potential sensor-related failure [36264]. (b) actuator: While the articles do not specifically mention actuator-related failures, the overall discussion on the vulnerability of smart city systems to cyber attacks implies that actuator errors could also contribute to failures in the system. (c) processing_unit: The articles emphasize the lack of security testing on the systems purchased by city authorities and governments, indicating potential processing unit-related failures due to security vulnerabilities [36264]. (d) network_communication: The articles highlight the importance of encryption in wireless data transmission to prevent data interception by hackers, suggesting that network communication errors could lead to security breaches and potential failures in the system [36264]. (e) embedded_software: The articles mention that some vendors are not allowing security researchers to test their products, indicating a lack of scrutiny on the embedded software components of smart city systems, which could introduce vulnerabilities and potential software failures [36264].
Communication connectivity_level The articles discuss vulnerabilities in smart city systems that could lead to cyber attacks. Specifically, the articles mention the lack of proper security measures such as encryption in smart systems, making them vulnerable to attacks. For example, the traffic control sensors installed around the world were highlighted as being vulnerable to attacks from hackers [36264]. This vulnerability could be related to the communication layer of the cyber physical system, particularly at the connectivity level where data is transmitted wirelessly without adequate encryption, allowing potential compromise of security.
Application FALSE The articles do not provide specific information about a software failure incident related to the application layer of the cyber physical system that meets the given description. Therefore, it is unknown if the failure mentioned in the articles was related to the application layer.

Other Details

Category Option Rationale
Consequence non-human, unknown (a) unknown (b) unknown (c) unknown (d) [36264] The software failure incident discussed in the articles did not directly result in any property loss or financial impact on individuals. (e) unknown (f) [36264] The software failure incident discussed in the articles highlighted the vulnerability of non-human entities such as smart city infrastructure like traffic control sensors and smart power meters to cyber attacks. (g) unknown (h) unknown (i) unknown
Domain information, transportation, utilities, government (a) The failed system was related to the information industry as it involved smart city technologies such as traffic lights, smart meters for utilities, and public transport systems that collect and transmit data online [36264]. (b) The transportation industry was impacted by the software failure incident as the article mentions vulnerabilities in traffic control sensors installed in cities worldwide, making them susceptible to attacks from hackers [36264]. (g) The utilities industry was affected by the software failure incident as smart power meters were hacked, allowing tech-savvy users to reprogram the meters and potentially obtain energy for free, causing financial losses to utility firms [36264]. (l) The government sector was also involved in the software failure incident as city authorities and governments purchasing smart city solutions were highlighted for not adequately testing the security of the systems they buy, leading to potential vulnerabilities and risks of cyber attacks [36264].

Sources

Back to List