Cybersecurity Best Practices for Smart Cities cover art

Cybersecurity Best Practices for Smart Cities

Preview

Audible Standard 30-day free trial

Try Standard free
Select 1 audiobook a month from our entire collection.
Listen to your selected audiobooks as long as you're a member.
Get unlimited access to bingeable podcasts.
Standard auto renews for £5.99 a month after 30 days. Cancel anytime.

Cybersecurity Best Practices for Smart Cities

By: Cybersecurity and Infrastructure Security Agency
Narrated by: Tom Brooks
Try Standard free

£5.99 a month after 30 days. Cancel anytime.

Buy Now for £8.68

Buy Now for £8.68

About this listen

This guidance is the result of a collaborative effort from the United States Cybersecurity and Infrastructure Security Agency (CISA), the United States National Security Agency (NSA), the United States Federal Bureau of Investigation (FBI), the United Kingdom National Cyber Security Centre (NCSC-UK), the Australian Cyber Security Centre (ACSC), the Canadian Centre for Cyber Security (CCCS), and the New Zealand National Cyber Security Centre (NCSC-NZ). These cybersecurity authorities—herein referred to as “authoring organizations”—are aware that communities may seek cost-savings and quality-of-life improvements through the digital transformation of infrastructure to create “smart cities". In this context, the term “smart cities” refers to communities that:

  • Integrate information and communications technologies (ICT), community-wide data, and intelligent solutions to digitally transform infrastructure and optimize governance in response to citizens’ needs.
  • Connect the operational technology (OT) managing physical infrastructure with networks and applications that collect and analyze data using ICT components—such as internet of things (IoT) devices, cloud computing, artificial intelligence (AI), and 5G.

PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.

©2023 Tom Brooks (P)2023 Tom Brooks
Security & Encryption Technology Computer Security Hacking Cybersecurity
No reviews yet