{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T10:31:32Z","timestamp":1755599492580},"reference-count":21,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,4,1]]},"abstract":"<p>Smart cities are in development around the world to tackle urbanization challenges. Smart solutions are being developed to optimize scarce resources, reduce service cost, improve service quality and improve the livelihood of city residents. With smart city infrastructure getting digitized and remotely accessible, the risk of cyber security cannot be overlooked. This article describes the technical and non-technical challenges smart cities are facing with regards to cyber security attacks. The article outlines design requirements that should be considered when designing a secure smart city. The requirements are overarching technical, operational, social, safety, legal and usability domains. In addition, the article proposes cyber defense maturity levels for smart cities and describes threat models relevant to each maturity level.<\/p>","DOI":"10.4018\/ijisp.2019040103","type":"journal-article","created":{"date-parts":[[2019,4,4]],"date-time":"2019-04-04T14:06:54Z","timestamp":1554386814000},"page":"32-46","source":"Crossref","is-referenced-by-count":5,"title":["Cyber Defense Maturity Levels and Threat Models for Smart Cities"],"prefix":"10.4018","volume":"13","author":[{"given":"Ali Amur","family":"Al Shidhani","sequence":"first","affiliation":[{"name":"The Research Council, Muscat, Oman"}]}],"member":"2432","reference":[{"key":"IJISP.2019040103-0","doi-asserted-by":"publisher","DOI":"10.1109\/SIoT.2014.10"},{"key":"IJISP.2019040103-1","doi-asserted-by":"publisher","DOI":"10.1109\/CEWIT.2011.6135873"},{"key":"IJISP.2019040103-2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7510834"},{"key":"IJISP.2019040103-3","unstructured":"Cerrudo, C. (2015). An emerging us (and world) threat: Cities wide open to cyber attacks. In Securing Smart Cities."},{"key":"IJISP.2019040103-4","unstructured":"Cerrudo, C., Hasbini, A., & Russell, B. (2015). Cyber security guidelines for smart city technology adoption."},{"key":"IJISP.2019040103-5","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2016.7444889"},{"key":"IJISP.2019040103-6","doi-asserted-by":"publisher","DOI":"10.1109\/SII.2014.7028133"},{"key":"IJISP.2019040103-7","unstructured":"Cloud Security Alliance. (2015). Cyber security for Smart Cities An architecture model for public transport. European Union Agency for Network And Information Security."},{"key":"IJISP.2019040103-8","article-title":"World urbanization prospects, the 2011 revision","author":"U. N.Desa","year":"2012","journal-title":"Final Report with Annex Tables"},{"key":"IJISP.2019040103-9","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2014.7007710"},{"key":"IJISP.2019040103-10","doi-asserted-by":"crossref","unstructured":"Harris, S. (2014). Securing big data in our future intelligent cities.","DOI":"10.1049\/ic.2014.0049"},{"key":"IJISP.2019040103-11","unstructured":"Information Security Forum. (2011). Cyber Security Strategies, Achieving Cyber Resilience."},{"key":"IJISP.2019040103-12","doi-asserted-by":"crossref","unstructured":"John-Green, M. & Watson, T. (2014). Safety and Security of the Smart City-when our infrastructure goes online.","DOI":"10.1049\/cp.2014.0981"},{"key":"IJISP.2019040103-13","author":"S. N.Kondepudi","year":"2014","journal-title":"Smart Sustainable Cities Analysis of Definitions"},{"key":"IJISP.2019040103-14","unstructured":"Publicly Available Specifications. (2014). PAS 180: 2014 Smart Cities \u2013 Vocabulary."},{"key":"IJISP.2019040103-15","doi-asserted-by":"publisher","DOI":"10.1109\/PDP.2012.36"},{"key":"IJISP.2019040103-16","author":"M.Souppaya","year":"2016","journal-title":"Guide to Data-Centric System Threat Modeling"},{"key":"IJISP.2019040103-17","unstructured":"The Scientific and Technical Advisory Panel of the Global Environment Facility. (2014). Sustainable urbanization policy brief, proliferation of urban centres, their impact on the world\u2019s environment and the potential role of the GEF."},{"key":"IJISP.2019040103-18","unstructured":"Microsoft Corporation. (2002). The STRIDE Threat Model."},{"key":"IJISP.2019040103-19","first-page":"1","article-title":"Cyber security for a smart nation.","author":"V. L.Thing","year":"2014","journal-title":"2014 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)"},{"key":"IJISP.2019040103-20","doi-asserted-by":"publisher","DOI":"10.1109\/SSIC.2015.7245322"}],"container-title":["International Journal of Information Security and Privacy"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=226948","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T18:23:55Z","timestamp":1651861435000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJISP.2019040103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2019,4,1]]},"references-count":21,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijisp.2019040103","relation":{},"ISSN":["1930-1650","1930-1669"],"issn-type":[{"value":"1930-1650","type":"print"},{"value":"1930-1669","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,1]]}}}