Intelligently adapting African cities for a better as well as a safer life

Issue 8 2021 Government and Parastatal (Industry), Information Security

While many have focused on data analysis and its security at an organisational level, it is even more imperative for the realisation of smarter and more sustainable cities capable of providing citizens with a better, safer lifestyle.

“Take consumption data of water and electricity at buildings as an example. This is often incorrect or unreliable. In many African countries both these utilities are distressed and putting measures in place to review the data and find ways to optimise usage cannot be ignored. While identifying low-hanging fruit like leaks, running taps, lights that do not get switched off or are not energy efficient might sound self-evident, it is concerning how these basics are still not followed,” says Alison Groves, regional director, WSP in Africa.

Things like Energy Performance Certification (EPC) are starting to force building managers to interrogate their consumption data better and use technology to optimise usage. This is where technology for resilience becomes essential as this can assist in identifying where resources are being wasted.

“Of course, this is not an easy undertaking. Just consider taking data from a building with 38 water meters and the same amount of electricity meters and trying to make sense of it. Data analysis and putting it in a format to tell a story to managers therefore becomes one of the most critically important skills to have in a digital world. Ultimately, data becomes the cornerstone of sustainability and people must have the skills to effectively analyse it,” says Groves.

Furthermore, the popularisation of Internet of Things (IoT) sensors to help capture data at the source in cities is gaining momentum. This data can be used to create a safer environment. For instance, by enabling commuters to live-track public transport, they do not have to stand and wait at a bus stop. They can see exactly where the bus is and plan accordingly. This increases the reliability and appeal of public transport. People can also use their smartphones to geolocate potholes through an app that can help the municipality speed up its response time to fix problems. Such reporting has already had a beneficial reaction in terms of putting more accountability in place for cities to improve service delivery.

Groves suggests that another consideration is the need to have all buildings operating to NetZero carbon standards by 2050.

“To achieve this goal, NetZero buildings will require some form of self-sustaining renewable energy and localised smart grids that are managed by sensors and data. Building on this, integrated weather sensors will also help to predict availability of power and thereby enable the smart building information system for the premises to prioritise energy requirements by tuning down or switching off non-essentials – especially when there is little solar PV available, for example,” says Groves.

“But without policies in place to manage data from these integrated systems, it will be extremely challenging to realise. However, private companies are pushing towards that. And this is where smart cities can also play a role. By integrating the live, work and play ethos in cities that are technology-enabled and focused on sustainability, there is potential to positively disrupt the market.”

With technology used to draw people to a city by making it operate seamlessly, policy and design become critical to make living there a sustainable exercise. Reducing the travel footprint (less commuting) and optimising the transport of goods and services, new build smart cities can circumvent the challenges found in existing cities. These smart cities can also have sensors in place to detect problems early on as opposed to the challenges of applying these to existing spaces that might not be suited for those sensors.

“Think of a green city as using less resources and a smart city as a place where everybody wants to be. Both these are converging and creating an environment that is more resilient and thereby sustainable. This new smart city is essentially just a larger version of a smart building. Of course, the data that is generated operates on a significantly larger footprint,” continues Groves. “Additionally, key lessons learnt in new build smart cities can also be suitably adapted and applied to retrofit existing spaces in support of reduced emissions, improved efficiencies and boasting carbon neutrality.”

Security considerations to onboard in this process

But we know that wherever there is data, there is a danger of threat actors seeking to compromise or steal it. Smart buildings and cities therefore require as much a security-centric approach as they do an environmentally sustainable one.

“The functioning of buildings and cities in the future will depend on how secure IoT and other connected systems are. Just think about the safety considerations if a hacker should gain access to IoT-enabled traffic lights. Being able to change the lights can spell disaster when it comes to commuters’ lives,” says Bethwel Opil, enterprise sales manager at Kaspersky in Africa.

The Covid-19 pandemic has resulted in companies, buildings and cities embracing digital processes to improve operational systems. In particular, the infrastructure of smart cities now includes more IoT devices that link transportation networks and digital government services and businesses. This means that cyberthreats increasingly endanger the physical world and have become a serious obstacle for the digital transformation of African cities.

“Smart city cybersecurity is a significant challenge that requires comprehensive measures. Building the information security of traditional IT networks operated by city utilities and authorities, public services, educational institutions and other urban organisations is no different from standard corporate security practice,” says Opil.

Those planning on creating smart urban systems using IoT (from smart traffic lights to systems that collect meter readings or respond to incidents on power grids) must consider the potential information security risks at the design stage and employ dedicated IoT security solutions from trusted, reputable vendors.

“Increasingly, 5G has been used to optimise the connectivity of IoT devices as it is faster and more reliable than other cellular solutions. IoT can now cover more areas, giving previously non-networked devices connectivity and centralised management. This means better visibility, efficiency and performance. But it also exposes the population to more risks as the entire system is connected. If one node is attacked, many more may be affected,” adds Opil.

5G network security will require flexibility for cities to manage multiple unknown devices with various levels of security, moving away from previous authentication models. A new, unified hybrid framework is needed to coordinate different security methods for each security layer. If devices cannot be authenticated, are misbehaving, or not adequately set, processes need to be in place to isolate them.

“If we are to embrace more sustainable, smarter and efficient cities better suited to the connected world, data management and security must become core pillars. But understanding data to optimise utility management, improve service delivery and to identify proactive areas to ensure growth can only be done optimally when it is protected against an evolving cyber threat landscape,” concludes Opil.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...
AI augmentation in security software and the resistance to IT
Security Services & Risk Management Information Security
The integration of AI technology into security software has been met with resistance. In this, the first in a series of two articles, Paul Meyer explores the challenges and obstacles that must be overcome to empower AI-enabled, human-centric decision-making.

Read more...
Milestone Systems joins CVE programme
Milestone Systems News & Events Information Security
Milestone Systems has partnered with the Common Vulnerability and Exposures (CVE) Programme as a CVE Numbering Authority (CNA), to assist the programme to find, describe, and catalogue known cybersecurity issues.

Read more...
Access & identity expectations for 2024
Technews Publishing IDEMIA ZKTeco Gallagher Salto Systems Africa Regal Distributors SA Reditron Editor's Choice Access Control & Identity Management Information Security AI & Data Analytics
What does 2024 have in store for the access and identity industry? SMART Security Solutions asked several industry players for their brief thoughts on what they expect this year.

Read more...
Zero Trust and user fatigue
Access Control & Identity Management Information Security
Paul Meyer, Security Solutions Executive, iOCO OpenText, says implementing Zero Trust and enforcing it can create user fatigue, which only leads to carelessness and a couldn’t care attitude.

Read more...
Passwordless, unphishable web browsers
Access Control & Identity Management Information Security
Passkey technology is proving to be an easily deployed way to bring unphishable, biometric-based security to browsers; making identification and authentication much more secure and reliable for all parties.

Read more...
Practical guide to protect data privacy
Training & Education Information Security
The Data Privacy Toolkit, reflecting the evolving landscape of data privacy, includes guidelines and recommendations to safeguard sensitive information crucial for protecting sensitive information from malicious actors.

Read more...
Exclusive Networks Africa partners with HCLSoftware
News & Events Information Security
Exclusive Networks Africa has secured an agreement with HCLSoftware, the software business division of HCLTech, which will see the cybersecurity specialist for digital infrastructure add the HCLBigFix endpoint management platform to its existing cybersecurity offering.

Read more...