How can you build efficient Urban communities, homes, and businesses?

You need to log in to create posts and topics.

Centralized Network Access and IT infrastructure (Community ISP/Datacenter) for Cyber Security

This idea essentially means that a community would have centralized internet access and IT infrastructure, preferably comprised of wireless (4g/5g/wifi). What you DONT want is each individual home/business setting up their own routers, networks, etc.

Benefits:

  1. From a cyber security standpoint, this provides a greater level of security for the entire community by allowing security controls to be put in place centrally and eliminates much of the responsibility from end users of securing their own individual networks. A large scale wireless-mesh network would eliminate the need for costly wiring through the ground and inside buildings.
  2. IoT Security: These communities will likely contain many IOT devices that would otherwise need to be managed and secured by the individuals or organizations that purchase/own/run them. Centralizing the network access/infrastructure would provide a single point of control for all devices connecting to the community network, including IoT (internet of things) devices such as televisions, cash registers, air conditioning systems, home lighting systems, security systems/cameras, Amazon Alexas, etc.
  3. This makes life easier for any businesses who will be taking credit card transactions, or storing personal data, as their infrastructure would be centrally configured for things like PCI compliance. This would encourage start ups and reduce barriers to entry into starting businesses, because much of the necessary IT infrastructure would already be in place and secured. This also means that a centralized security policy can be created, which offloads a lot of work from individual organizations who normally have to constantly maintain and develop their own security policies.
  4. This also allows leadership to monitor and control access to community IT/network resources. Law enforcement would have a single point of contact if they need to obtain any information regarding surveillance, transaction records, malicious network activity, cybercrime, etc.
  5. No more "muh election hax." Current states or municipalities  (most public infrastructure) these days are frankenstein systems comprised of old, un-updated operating systems and propietary software/hardware. This means that, for example, states outsource infrastructure to third parties who follow completely different security policy, and use voting machines that have been programmed and tampered with by X amount of people over Y amount of time and in Z amount of locations. They bring in these archaic machines and hope that they work with the in-place networks, and hope that they stay safe during transit. With a centralized IT/network infrastructure you could control the digital election process from start to finish without any third party involvement at any time. "Voter ID Cards" are unnecessary because each member of the community already has an account in the community database and they can easily authenticate themselves with something like....
  6. Simple Two-Factor Authentication for everyone. These days you need a card for your membership at the gym, a different card for your membership at the grocery store, a different ID card to vote, a card to open your apartment gates, and on and on... These are all forms of authentication or "proving your identity." Since we have centralized internet/IT infrastructure, we can integrate a community 2FA system that eliminates the need for all of these and streamlines the authentication process, in the form of "something you have" such as an NFC chip in your ID, a (single) key fob, or "something you know" such as a pin or passphrase.

This idea essentially means that a community would have centralized internet access and IT infrastructure, preferably comprised of wireless (4g/5g/wifi). What you DONT want is each individual home/business setting up their own routers, networks, etc.

JanusSecurity is an interesting handle. Are you familiar with the porous nature of corporate infrastructures. The organizing principle of dumb pipes and edge nodes? Security implications of IOT. Attack surfaces?