other  devices;  displaying  information  into  text, 
contextual views out of text, audio and video formats; 
the emergence of new ways to exploit the service of 
determining precise location of an electronic device 
using the Internet, new ways to provide for personal 
needs of users, new ways of requests and analytics 
based  on  public  identity;  minimal  or  complete 
absence  of  human  intervention  in  the  operation  of 
machines to identify and process data, to use them for 
various  purposes;  the  possibilities  of  biometrics  to 
penetrate into a person's personality and its functional 
changes. 
Analysis  of  possible  risks  in  the  system  of 
functioning  of  smart  cities  resulting  in  the 
identification of key aspects for their minimization or 
complete  elimination  to  ensure  digital  security 
(Vladimirova et al., 2015). 
Distribution  of  efforts  on  three  levels:  services 
(education, medicine, tourism, public safety); objects 
(residential buildings and premises, offices, trading 
floors,  clinics,  schools,  preschool  educational 
institutions);  infrastructure  (energy  and  water 
resources, transport, waste disposal, information and 
communication technologies). 
Compliance  with  key  requirements:  focus  on 
providing  the  basic  needs  of  the  individual; 
manufacturability  of  interconnected  objects  of  the 
city, ensuring its functioning; increasing the level of 
resource management of the urban environment, as 
well  as  its  comfort  and  safety;  commitment  of 
economic efficiency. 
Widespread  implementation  of  innovative 
electronic and engineering solutions. 
Regular,  integrated  accounting  of  public 
incidents,  forecasting  non-standard  situations, 
developing ways to respond to them. 
4  CONCLUSION 
Compliance with the established rules for the work of 
structures and their management. 
Systematic  monitoring  and  control  of  data 
received from devices, sensors, stationary and mobile 
tracking  objects,  broadcasting  the  results  to  the 
appropriate  subsystems  in  order  to  anticipate  non-
standard situations, quick response to incidents. 
Tracking the crime situation in real time. 
The  use  of  biometric  platforms,  intelligent 
surveillance,  recognition  and  location  detection 
systems for shots from firearms. 
Identification  of  weaknesses  in  the  security 
system of infrastructure facilities. 
Instant interagency information interaction. 
Advanced  training  of  personnel  providing 
information security in smart megalopolises. 
Legislating  owners  and  users  of  information  in 
smart cities.  
Educating  the  population  in  a  reasonable, 
conscious,  careful  use  of  digital  resources,  and  in 
taking  personal  responsibility  for  the  security  of 
personal data. 
Improving the nature of the interaction between 
police  authorities,  service  providers,  and  other 
products in smart cities. 
Knowledge, appreciation, timely prevention and 
prompt  overcoming  of  cyber  threats  will  allow 
actively  resist  aggressive,  harmful  effects  on  the 
functioning  of  "smart"  cities  of  various  negative 
phenomena  and  factors,  improve  the  quality  and 
standard  of  living  of  the  population  in  modern 
megalopolises (Kupriyanovsky, 2017). 
REFERENCES 
Abid, A., Abbas, A., Khelifi, A., Farooq, M. S., Iqbal, R., 
& Farooq, U. (2020). An architectural framework for 
information  integration  using  machine  learning 
approaches  for  smart  city  security  profiling. 
International Journal of Distributed Sensor Networks, 
16(10). doi:10.1177/1550147720965473 
Berkel, A. R.  R.,  Singh,  P.  M.  and  van  Sinderen,  M.  J. 
(2018). An information security architecture for smart 
cities. doi:10.1007/978-3-319-94214-8_11 
Chipiga,  A.F.  (2017).  Information  security  of  automated 
systems, 336 p. M.: Helios ARV 
Cilliers, L. and Flowerday, S. (2014). Information security 
in a public safety, participatory crowdsourcing smart 
city  project.  World  Congress  on  Internet  Security, 
pages 36-41. doi:10.1109/WorldCIS.2014.7028163 
Daniel, T. S. E., Li, R. and Zheng, H. (2019). Risks facing 
smart  city  information  security  in  hangzhou.  ACM 
International Conference Proceeding Series, pages 29-
33. doi:10.1145/3374549.3374552 
Denisov,  V.V.  (2016).  Identification  of  data  security 
vulnerabilities  in  the  informatization  of  production 
processes. In the book: Youth and the XXI century – 
2016.  Materials  of  the  International  Youth  Scientific 
Conference:  in  4  volumes.  Managing  editor:  A.A. 
Gorokhov, pages 287-292. 
Din, Z., Jambari, D. I., Yusof, M. M. and Yahaya, J. (2019). 
Challenges in managing information systems security 
for internet of things-enabled smart cities. International 
Conference on Research and Innovation in Information 
Systems,  ICRIIS. 
doi:10.1109/ICRIIS48246.2019.9073661 
Dong, N., Zhao, J., Yuan, L. and Kong, Y. (2018). Research 
on information security system of smart city based on 
INFSEC 2021 - International Scientific and Practical Conference on Computer and Information Security