Cyber Security and Smart City Singapore Smart City Essay Example
Cyber Security and Smart City Singapore Smart City Essay Example

Cyber Security and Smart City Singapore Smart City Essay Example

Available Only on StudyHippo
  • Pages: 15 (3988 words)
  • Published: November 20, 2021
View Entire Sample
Text preview

Abstract

Singapore is well recognized as a leading partner in Waste management, strategic security, and technological innovation. The development of Singapore Smart City introduces the country into the leadership of global smart cities in the history of the world. But, Smart Cities comes with their own package of challenges which Singapore Smart City concept must be ready to face. Some of these include cyber security challenges and cyber-attacks. This study’s hypothesis argues that individual attitude towards cyber security is the leading cause of increased global insecurity and cyber-attacks. The paper relied on qualitative research approach to analyzing and evaluates numerous sources that explore the Singapore Smart City project. Research data collected from students Participants indicates that most of them are not concerned about their safety online as long as they have their handsets and devices working. Follow

...

ing this data result, the paper concludes that attitude and culture are the biggest enemies towards cyber security globally as well as in smart cities such as Singapore Smart City.

Introduction

Singapore is a wealthy financial center that is well known for its tight control of individual behavior For example, there is strict restriction on chew gum sale on the sale; as a move towards a clean city and tidiness on the streets. Other than this goody, Singapore has started a Smart City under the Smart Nation’s programfootnoteRef:1. The Smart City concern helps involves deployment of numerous cameras and sensors that are aimed at aiding the government in monitoring everything from crowd movements, traffic and even cleanliness of public spacesfootnoteRef:2. Other than tackling issues of waste collection, traffic management and street lighting, the Smart City technology pulls together all medical facilities, universities

View entire sample
Join StudyHippo to see entire essay

research and development centers R&D together to work with the government in a holistic manner to achieve better living conditions as well as greater business opportunities for all people living in Singaporefootnote.

However, the good package of Smart City concept carries with loads and loads of challenges that may affect or destroy the whole city development. Critically thinking, the smart city technologies in Singapore promise to change the concept of “Internet of Things” into “Internet of everythingfootnoteRef:4.” But, we are all aware of how devices such as Fitbits and Smart Meters Products of Internet of Things has resulted in information security issues, limited access standards for both data security and wireless network for both amateurs and startsfootnoteRef:5. Now, thinking of Smart City in Singapore where everything including public transportation, public water systems, waste management, power grids, street lighting and physical security we expect a huge rise in Cyber Security issuesfootnote. Having this in mind, it is important to look into how Internet of things, Smart City, Cyber Security and Cyberspace issues may end up affecting Singapore as a countryfootnote.

Cyber Security

Naturally, data compromise by hackers, Network outages, and computer malware and viruses are some of the incidents that affect an individual who have one or two accounts online including emails. In the current world of digital applications, mobile use, data networks and Smart Cities, issues of cyber insecurity will continue to increase. Therefore, there is a need for growth in professionals working towards security individuals onlinefootnoteRef:8. This is Cyber Security. Cyber Security is information technology security that is focused on securing networks, Protecting computers, data and programs from unauthorized destruction, access or change. From a Smart City

point of view, Cyber security is a very important issue that must be considered by the Smart’s Nation Program.

Cyber Space and Big Data Analysis

Simply Cyber Space is the environment where communication between one computer and other communicates over the network. Financial Institutions, Corporations, Governments, Hospitals, Businesses and military camps collects process, analyze and store their confidential information on computers which communicate through the cyberspace made possible by computer networkingfootnote. Therefore, the Smart Nation Program must lay more attention on Cyber Security and cyberspace protection due to increased issues of sophisticated cyber-attacksfootnote.

Internet of Things

Simply Internet of Things (IoT) may be described as an era when networking or internet expands to touch issues such as Health facilities, energy grids, Manufacturing, financial institutions, educational establishments such as University, Research and Development Centers and Transportation facilitiesfootnoteRef:11. In essence, Internet of Things IoT connects devices over the web, gives them an opportunity to communicate to each other and finally help humans solve some issuesfootnote. For example, we have Smart meters For energy conservation and remote power controls, Smart Fridges which communicates in case our Beer Stock goes down. In Singapore, we are having the Smart City that will take this human-tech relationship to a higher notch.

Smart City

As highlighted above, in the current day and time, Internet of Things IoT has scaled up a notch higher, introducing us to Smart Cities. Smart Cities are cities run by technology where connected networking monitors utility, Traffic, Waste Management Use of Smart Bins that signal relevant authorities when the need for emptying arisesfootnoteRef:13. In Smart Cities, everything is monitored using cameras and sensors which make it simple for individuals to live a healthy, secure

and fulfilled lifefootnote. For sure, Smart City is a great improvement to the Singapore. For example, according to 2014 census, the urban population in Singapore accounts for 54% which has a higher possibility of growing. This implies that the population of the senior people is also increasingfootnote. With Smart City in place management of these individuals will be easy because there will be smooth coordination between the health care system, water and food resources and well as the transport networking systems which will make it simple for them to livefootnote.

Research Problem Statement

From an economic point of view, cities are very important in a country. They act as the backbone of civilization and economy. Therefore, following the promises laid by Smart Nation Program, the Smart City in Singapore will have double or triple the advantages attached to having well-performing cities. But, Smart Cities come with their own problems which will make it challenging for Singapore to maintain and control. One of the biggest problems about the Smart City in Singapore is that sensors in different equipment and devices around the city may be hacked and fed with fake and malicious datafootnote. This would result to signal failures, data theft, system shutdown Governmental, Healthcare, and Transport management, and contamination of water supply as well as security breachesfootnote.

Research Argument

Having analyzed the benefits and risks of Smart Cities Singapore Smart City, this paper will argue that people’s attitude towards the new technology will determine the security or insecurity of the people living in the city. For example; many people are not concerned about cyber security, they go running their Credit cards anywhere as long it has a Visa Card

label on it. This is one attitude that gives Cyber Insecurity an opportunity to grow while camouflaging itself with the tech innovations.

According to Sara Peters (2015), Smart Cities come with insufficient Testing and Insecure products. Smart City acts as a potential target for hackers. They all aim at stealing information from the cyberspace loopholesfootnoteRef:21. They mostly focus on financial data Credit Card data, personal information or even companies and confidential government informationfootnoteRef:22. Hackers achieve these unethical acts by compromising the normal working capacity of devices and equipment by feeding them with viruses or malwarefootnoteRef:23. They hit at a most unexpected time, therefore, putting individuals using amenities at the Smart City in Singapore at risk. In the current era of technological information, individuals have the ability to develop software and hardware which are then released to the world without verification from either the government or cyber control agenciesfootnote. For example, in the year 2013, major government websites in Singapore were hacked into by an individual calling himself “Messiah.” His main concern was protesting against the internet licensing frameworks placed by the government during the time. Following his cyber-attack actions, thirteen governmental websites were defaced. Some of the affected websites included’ The Straits Times Reporter Blog, The Prime Minister’s Official Website, The People’s Action Party’s Community Foundation and The Ang Mo Kio Town Councilfootnote.

Growth in population increase pressure on local authorities and government by demanding new products and services from either the social, economic or political aspects of the society. In achieving these demands, the government is forced to put in mind demands by international carbon emissions, security and human rightsfootnoteRef:26. For example, the government in Singapore

came up with the Smart City project in order to provide better services and life to its membersfootnote. The Smart City in Singapore may only be made possible by allowing easy communication between financial, Transport, Governmental, and Social Institutions. This communication is made possible by Institute of Electrical and Electronic Engineers IEEEfootnote. Regional cyber security: moving towards a resilient ASEAN cyber security regime.

Subject Legality

In Singapore, Cyber-attacks and hacking are punishable under the clauses are given by the Computer Misuse and Cyber Security Act (Cap 50A, 2007. Rev Ed). The act states that any individual who falsely accesses unauthorized information by causing the computer to download the data either manually or using a Programme is termed guilty. In most cases, individuals are tricked to send login details to their banks, social media accounts on online banking details which then result to data theftfootnoteRef:38. Therefore, subsection 3(2) of the Act places heavy penalty on individuals who will be found guilty of tricking victims to offer their login details with claims of approving or modifying their profiles. Basically, the topic on Singapore Smart City and its vulnerability to cyber security is connected to Computer Misuse and the Cybersecurity Act CMCA because it offers the laws that guard and protect users of the technology against unauthorized disclosure of computer access codes, obstruction of computer use and unauthorized interception of computer network with the aim of modifying or stealing data. This subject truly shows the importance of information among the population against cyber security attacks which would play a part in supplementing the protection offered by Computer Misuse and the Cybersecurity Act CMCAfootnote.

According to (Calder, 2016), the Smart City technology

in Singapore brings in the interdependence and interconnectedness of services into one single dashboard controlled by government and stakeholders who are responsible for ensuring development Adhering to the policies and practices of people living in SingaporefootnoteRef:40. It is believed that the Smart City system guarantees and efficient, resilient governance, security and on-time delivery of services. Some of the technologies and systems involved in the Singapore Smart City are; 40: Calder, Kent E. 2016. Singapore: smart city, smart state.

Smart Energy Grids

The smart energy grid technology is made to ensure satisfactory energy consumption by a user. It is believed that this technology reduces costs, environmental impact as well as improves the efficiency of energy consumptionfootnote. Every residential building is fitted with a smart meter and sensor which are then connected with the users IP addressfootnote. The connection makes it easy to communicate user consumption patterns as well as offer an opportunity for end-user control. By doing this, government bodies and other relevant bodies in the energy industry can offer advice to the consumer through the same platform. But, this free information sharing platform has its own effects on the security of both the user and government information. With this system in place, hackers are free to hack into the system, change details and access users personal information such as phone numbers, bank details, etc. These issues may land the whole population into a more dangerous encounterfootnote. According to (Tan, Annette & Amy Van, 2013), many users are not concerned about how the system works; they work with the devices as long as it is functioning which gives hackers a great opportunity to access their personal details and

datafootnote.

Intelligent Transportation and Connected Healthcare

Smart City offers real-time information which is made possible by Global Positioning Systems (GPS), WI-FI explained by Institute of Electrical and Electronic Engineers IEEEfootnote and RFID technologies. The systems offer data analytics and prediction techniques that make it simple for individuals to enjoy both public and private travel. For example, Sensors actively collect information about city traffic, then send it through GPS communication or wireless network to centralized control systems which assist traffic departments in decision-making and synchronization of traffic light operationsfootnote.

Connected Healthcare

Smart City improves the common Electronic Patient Records experienced in Healthcare centers. The connection of healthcare system with the technologies will make it easy for the population to access their health care clinicians and professionals in an easy manner. Basically, telemedicine and improved structures in the medical arena are expected to begin growing in SingaporefootnoteRef:47. According to Association for Computing Machinery ACM, partners in creating the Smart City must also collaborate in teaching the population on cyber security and issues surrounding the whole techno-novation in Singapore. This is because, growth in technology calls for increased security risks which may affect the whole generation. Therefore, the Literature review has shown that the population appreciates the Smart City elements without having increased understanding of the risks associated with sharing their information onlinefootnote.

Methodology

This chapter will depend on the Qualitative method to analyze and evaluate the issue of cyber security in relation to Smart City in Singapore. Qualitative method is applied in this case because it works in describing the elements and issues associated with cyber security both internationally and locally Singapore. This paper relied on a survey to evaluate how well individuals

are connected to the web and how well they are aware of the risks associated with online activities and transactions.

Study Population

The study population for this study was University and College students based on the fact that they spend much of their time online either on social media, blogging or purchasing books online.

Sampling Method

Random sampling method was the most effective method of accessing potential study participants because everyone around the university has a laptop, a smartphone of a desktop which they use to access online content.

Sample Population

The sample population for this research was 30 participants. To achieve a balance, there were 15 males and 15 females in order to achieve a quantified conclusion to the paper’s thesis. The participants will be used to answering the research question by filling in the survey questions which are then supplemented by oral interviews and questionnaire to verifying the participants understanding of cyber security related issues.

Data Collection and Analysis

The survey data was collected using tables. Tables were the most effective way of collecting this data because it offered an easy platform for analysis. The research analyzed the “mean” of the whole population as well as separate “gender” means to evaluate their participation in social media and their attitude towards cyber security concerns.

Results and Discussion

According to the results collected, all the 30 participants extremely use social media and online banking. Among the participants, 25 of them use to go online for about 3 hours in a day while the rest 5 are always online on their devices. Additionally, 10 out of the 30 participants have ever met at least 50 of their social media and online friends while the other 20

have never met a friend. All the participants have numerous applications and games downloaded on their devices. Finally, out of 15 females participants only 5 are aware of Cyber Security and Cyber-attacks. On the other hand, 10 males are aware of hacking and data phishing.

Discussion

According to the collected data, a good population has its life stuck on social media for a considerable amount of time. The study participants spend at least three hours daily on social media, online shopping, and online banking. Furthermore, most of them confirmed that they use their cards to pay bills, buy online on Amazon and even pay to download e-books and Movies online. Having this in mind, this was the best group to involve in this study. According to the participants, only a small number of them have met their online social media friends. This means that only 33% of the participants have met their friends. Despite not meeting most them share pictures, personal stories or other confidential information. This is an enough indication to show that they are not aware of how risky it is to share personal information online with strangers. The literature review highlighted that individuals are currently creating software and hardware which are then presented as mobile or desktop applications. All the study participants have these unverified applications on their phones. Some do not even understand how an application may be used to read and record user’s daily transaction in an awake of data theft.

Additionally, there was another evident issue among the participants; more males were informed about cyber-attacks and cyber security issues as compared to their counterparts. This confirms the argument that personal attitude towards

a certain issue determines its success or failure. In our case, males are more concerned about cyber security issues than females; this brings in the issue why most females are victims of data theft. Therefore, we can confidently confirm that our hypothesis that individual attitude determines his knowledge of cyber-related issues and concerns. The lesser individuals are concerned about cyber security, the higher the opportunity for hackers to hit backfootnoteRef:49. Therefore, in the case of Smart City in Singapore, the Smart Nation Program must offer public teaching and capacity building on how to use the systems and the information that should be shared onlinefootnote.

Recommendation

The sample population represents the ideal challenges faced by the wide population either in Singapore or globally. Therefore, the government must work together with partners such as Institute of Electrical and Electronic Engineers IEEE and Association for Computing Machinery ACM in order to ensure that the strategies and precautions offered by Computer Misuse and the Cybersecurity Act CMCA are put in consideration while implement technologically related projectsfootnote. Therefore, below are some recommendations.

1. Public-Private partners should unite to bring leverage in improving Cybersecurity. This would work in addressing both the current and emerging technological threats.
2. Regulators and policy makers in Singapore should try to address economic barriers of different infrastructures in order to achieve a secure cyber space.
3. Politicians Members of Parliament should always prioritize Research and Development which is aimed to improve Cybersecurity.
4. Global supply chains Social, Economic, and Political can only be secured by adopting practices and other global standards.
Chapter Five

Conclusion and Future Work

From the field research and literature review, it is evident that Smart Cities such as the Singapore Smart

City creates a huge and complex attack surface where hackers can easily access user’s information. The longer the computer integration network is, the wider the gaps that hackers can use to access this information unauthorizedfootnote. A cross-examination of participants on their involved in online and technologically related activities tested positive, but, their knowledge and understanding of cyber security concerns tested negative. This is an indication that individuals are not concerned about cyber security issues which result to increased disposal of personal information of public spaces such as Social Media, Chat forum which eventually result to data theft and cyber-attacks.

Moreover, it is clear that military has a role to play to ensure the security of their land by collaborating with international community military forces to ensure peace and stability. A visit to Forensic Crime offices by Tony tan the president of Singapore showcased the importance of having a functional Military and police unit which can be used in fighting criminal and terrorism activities happening both on land on through technologyfootnote. Other than that, military men may be used for teaching people on how to hand technological devices and how to detect that a system has been hacked or fed with malicious data. In so doing, peace and stability are achieved.

Lessons Learnt

Lessons Learnt from the Singapore Smart City requires more agility and forecasting. This will be the only possible way the Singapore Smart City will lead the E-world in Smart City world. Therefore, leadership Government, Policymakers, and Regulators require to have tangible innovation and ideas to implement the platforms offered by Institute of Electrical and Electronic Engineers IEEE and Association for Computing Machinery ACM in order to

create cyber security preventive policies and a safer E-environment for Singapore Smart City users’.
According to Jeff Man (2015), cyber security is more of culture and attitude than compliance. Therefore, the society must change its attitude towards is the perception of cybersecurity so as to improve its security and reduce potential cyber-attack threats. This means that complete protection for the Singapore Smart City begins with users’, by protecting themselves, they seal all available loopholes that hackers may use to attack the systemsfootnote. Therefore, the concluding remarks for this study are that cyber security issues are harbored within personal attitudes of users’ which pose threats to the smart city technologyfootnote.

Future Work

Future work should focus on how individual data may be protected from leaking from the Smart City technologies into the hacker’s hands. Furthermore, it should showcase the most effective way of teaching grassroots on cyber security.

Bibliography

  1. Calder, Kent E. 2016. Singapore: smart city, smart state. Washington, D.C. : Brookings Institution Press
  2. Curry, David, Cate Lawrence, Donal Power, and Kristina Heinze. 2016. "Are Happier Citizens Making Singapore A Smart City Leader?".Readwrite. http://readwrite.com/2016/09/12/pragmatism-keeps-singapore-global-smart-city-leader-cl4/.
  3. Glaeser, Edward L. 2011. Triumph of the city: how our greatest invention makes us richer, smarter, greener, healthier, and happier. New York: Penguin Press.
  4. HUIWEN, NG. 2016. "Cybercrime Threat A Big Challenge For Singapore: President Tony Tan". The Straits Times. http://www.straitstimes.com/singapore/courts-crime/cybercrime-threat-a-big-challenge-for-singapore-president-tony-tan.
  5. IEEE International Solid-State Circuits Conference. 2015. 2015 IEEE International Solid-State Circuits Conference: Digest of Technical Papers : ISSCC : February 2015.
  6. IEEE International Symposium on Broadband Multimedia Systems and Broadcasting. 2015. Broadband Multimedia Systems and Broadcasting (BMSB), 2015 IEEE International Symposium on: date 17-19 June 2015.
  7. Jaffe, Eric. 2016. "What Smart Cities Can Learn From

Singapore’S Smart Nation – Sidewalk Talk". Medium. https://medium.com/sidewalk-talk/what-smart-cities-can-learn-from-singapore-s-smart-nation-e19a7efefa3a#.p05f1u4x4.

  • Konomi, Shin?ichi, and George Roussos. 2016. Enriching urban spaces with ambient computing, the internet of things, and smart city design. Hershey : Engineering Science Reference
  • Man, Jeff. 2015. "Cybersecurity Is About Attitude, Culture — Not Strictly Compliance".
  • WIRED.https://www.wired.com/insights/2014/04/cybersecurity-attitude-culture-strictly-compliance/.
  • Peters, Sara. 2015. "Smart Cities' 4 Biggest Security Challenges". Dark Reading. http://www.darkreading.com/vulnerabilities---threats/smart-cities-4-biggest-security-challenges/d/d-id/1321121.
  • Purnell, Jake. 2016. "Singapore Is Taking The ‘Smart City’ To A Whole New Level". WSJ. http://www.wsj.com/articles/singapore-is-taking-the-smart-city-to-a-whole-new-level-1461550026.
  • Sim, Javern. 2016. "Cybercrimes In Singapore". Britcham.Org.Sg. http://www.britcham.org.sg/static-pages/o48-feature-cybercrimes-in-singapore.
  • SmartNation Singapore,. 2016. "Smart Nation Singapore - Forbes". Smart Nation Singapore - Forbes. http://www.smartnation-forbes.com/.
  • Tan, Annette, and Amy Van. 2013. Singapore smart guide. Singapore : APA Publications UNODC,.2016. "Computer Misuse And Cybersecurity Act". Unodc.Org. https://www.unodc.org/res/cld/document/computer-misuse-and-cybersecurity-act_html/2014_COMPUTER_MISUSE_AND_CYBERSECURITY_ACT.pdf.
  • Venkataramanan, Madhumita. 2016. "Smart Cities Will Be Necessary For Our Survival". WIRED UK. http://www.wired.co.uk/article/smart-city-planning-permission.
  • Vinod Kumar, T. M. 2015. E-governance for smart cities. Singapore; New York: Springer
  • Anthony, Mely Caballero, and Alistair D. B. Cook. 2013. Non-traditional security in Asia: issues, challenges and framework for action. Singapore: Institute of Southeast Asian.
  • Broadhurst, Roderic G., and Peter N. Grabosky. 2005. Cyber-crime: the challenge in Asia. HKU Press Digital Editions. Hong Kong: Hong Kong University Press.
  • Heinl, Caitri?ona H. 2013. Regional cyber security: moving towards a resilient ASEAN cyber security regime. Singapore: S. Rajaratnam School of International Studies, Nanyang Technological University.
  • Institute of Electrical and Electronics Engineers; IEEE Computational Intelligence Society.(2013).IEEE Symposium on Computational Intelligence in Cyber Security.. Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS): 16-19 April, 2013
  • Yang Razali Kassim. 2011. Issues in human security in Asia. Singapore: S. Rajaratnam School of International Studies. Singapore : S. Rajaratnam School of International Studies :
  • Institute of Southeast Asian Studies.

  • WISI 2006, and Hsinchun Chen. 2006. Intelligence and security informatics: international workshop, WISI 2006, Singapore, April 9, 2006: proceedings. Berlin: Springer-Verlag.
  •  

    Get an explanation on any task
    Get unstuck with the help of our AI assistant in seconds
    New