Discusses some of approaches to cybercrime that are taken

Assignment Help Computer Network Security
Reference no: EM131597713

Assignment: Privacy and Security Reflextion- Smart Sensor Network

Length: Approx. 2500 words

Task

This assignment is designed to get you to reflect on your personal approach and feelings on information security and privacy.

Read:

Lau, Y. (2015). Cybercrime in cloud: Risks and responses in Hong Kong, Singapore. In Ko, R., & Choo, K.(Eds.). (2015). The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues. Waltham, MA: Syngress.

This chapter discusses some of the approaches to cybercrime that are taken by both the Hong Kong and Singapore governments. But, any approach to cybercrime comes with risks to information security and privacy.

Tasks:

I. Part of the Singapore Governments Smart Nation Plan is to deploy a network of smart sensors and cameras at traffic lights, bus stops, rubbish bins, etc. Discuss what you see as the implications for privacy of the Singapore Government's Smart Sensor Network. What effect do you think that this would have on you:

1. If you were a visitor to Singapore?
2. If you were a resident of Singapore?

II. Part of the Singapore Government's Smart Nation Plan is to deploy a series of sensor boxes to act as WiFi hotspots throughout the city. This would allow the introduction of a heterogeneous network where smart phones and other devices could seamless switch between mobile data and WiFi. What effect do you think that the plan would have on you:

1. If you were a visitor to Singapore?
2. If you were a resident of Singapore?
3. If you had sensitive information on your mobile device that you did not want to share?

III. If you were visiting Singapore after the Smart Nation Plan has rolled out, do you think that the use of a digital identity assist you to maintain your privacy while using your mobile phone or devices during your visit? Discuss the reasons for your answer.

IV. What steps do you think that you could take to ensure the security and privacy of your digital identity while operating your mobile device(s) in this environment? Discuss each step that you would take along with its advantages and disadvantages.

As a guide, your word limit for this assignment should be around 2,500 words.

Reference no: EM131597713

Questions Cloud

Define diverse characteristics-background of the assignees : An organisation was established 3 years ago and has earned an outstanding reputation throughout Singapore.
What is the equilibrium of this simultaneous move game : If they both hire consultants, they cancel each other out and they expect to get half the pot minus the consulting costs.
The nursing management of client health : Assess your knowledge of foundational concepts essential to the nursing management of client health by taking the interactive quiz.
Examine the business referencing style : Compare and contrast an aspect of employment relations in any two Southeast Asian countries. What are the causes of the differences between the two?
Discusses some of approaches to cybercrime that are taken : This chapter discusses some of the approaches to cybercrime that are taken by both the Hong Kong and Singapore governments.
What attributes would lead to success in business : The supply of workers in various labor markets differs substantially and affects staffing. The textbook identifies 3 types of labor markets.
Five main reasons that firms expand : What are the five main reasons that firms expand into international markets?
Determine the total expense recognized by ftcap : Determine the total expense recognized by Ftcap in each year's income statement and the lease liability reported in each year-end balance sheet
Provide a scenario and research question : What are some considerations you would need to take in designing the research as related to your hypothetical research question and selected method?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd