other devices; displaying information into text,
contextual views out of text, audio and video formats;
the emergence of new ways to exploit the service of
determining precise location of an electronic device
using the Internet, new ways to provide for personal
needs of users, new ways of requests and analytics
based on public identity; minimal or complete
absence of human intervention in the operation of
machines to identify and process data, to use them for
various purposes; the possibilities of biometrics to
penetrate into a person's personality and its functional
changes.
Analysis of possible risks in the system of
functioning of smart cities resulting in the
identification of key aspects for their minimization or
complete elimination to ensure digital security
(Vladimirova et al., 2015).
Distribution of efforts on three levels: services
(education, medicine, tourism, public safety); objects
(residential buildings and premises, offices, trading
floors, clinics, schools, preschool educational
institutions); infrastructure (energy and water
resources, transport, waste disposal, information and
communication technologies).
Compliance with key requirements: focus on
providing the basic needs of the individual;
manufacturability of interconnected objects of the
city, ensuring its functioning; increasing the level of
resource management of the urban environment, as
well as its comfort and safety; commitment of
economic efficiency.
Widespread implementation of innovative
electronic and engineering solutions.
Regular, integrated accounting of public
incidents, forecasting non-standard situations,
developing ways to respond to them.
4 CONCLUSION
Compliance with the established rules for the work of
structures and their management.
Systematic monitoring and control of data
received from devices, sensors, stationary and mobile
tracking objects, broadcasting the results to the
appropriate subsystems in order to anticipate non-
standard situations, quick response to incidents.
Tracking the crime situation in real time.
The use of biometric platforms, intelligent
surveillance, recognition and location detection
systems for shots from firearms.
Identification of weaknesses in the security
system of infrastructure facilities.
Instant interagency information interaction.
Advanced training of personnel providing
information security in smart megalopolises.
Legislating owners and users of information in
smart cities.
Educating the population in a reasonable,
conscious, careful use of digital resources, and in
taking personal responsibility for the security of
personal data.
Improving the nature of the interaction between
police authorities, service providers, and other
products in smart cities.
Knowledge, appreciation, timely prevention and
prompt overcoming of cyber threats will allow
actively resist aggressive, harmful effects on the
functioning of "smart" cities of various negative
phenomena and factors, improve the quality and
standard of living of the population in modern
megalopolises (Kupriyanovsky, 2017).
REFERENCES
Abid, A., Abbas, A., Khelifi, A., Farooq, M. S., Iqbal, R.,
& Farooq, U. (2020). An architectural framework for
information integration using machine learning
approaches for smart city security profiling.
International Journal of Distributed Sensor Networks,
16(10). doi:10.1177/1550147720965473
Berkel, A. R. R., Singh, P. M. and van Sinderen, M. J.
(2018). An information security architecture for smart
cities. doi:10.1007/978-3-319-94214-8_11
Chipiga, A.F. (2017). Information security of automated
systems, 336 p. M.: Helios ARV
Cilliers, L. and Flowerday, S. (2014). Information security
in a public safety, participatory crowdsourcing smart
city project. World Congress on Internet Security,
pages 36-41. doi:10.1109/WorldCIS.2014.7028163
Daniel, T. S. E., Li, R. and Zheng, H. (2019). Risks facing
smart city information security in hangzhou. ACM
International Conference Proceeding Series, pages 29-
33. doi:10.1145/3374549.3374552
Denisov, V.V. (2016). Identification of data security
vulnerabilities in the informatization of production
processes. In the book: Youth and the XXI century –
2016. Materials of the International Youth Scientific
Conference: in 4 volumes. Managing editor: A.A.
Gorokhov, pages 287-292.
Din, Z., Jambari, D. I., Yusof, M. M. and Yahaya, J. (2019).
Challenges in managing information systems security
for internet of things-enabled smart cities. International
Conference on Research and Innovation in Information
Systems, ICRIIS.
doi:10.1109/ICRIIS48246.2019.9073661
Dong, N., Zhao, J., Yuan, L. and Kong, Y. (2018). Research
on information security system of smart city based on
INFSEC 2021 - International Scientific and Practical Conference on Computer and Information Security