What step do you think that could take to ensure security

Assignment Help Computer Network Security
Reference no: EM131600837

Assignment

This assignment is designed to get you to reflect on your personal approach and feelings on information security and privacy.

Read:

Lau, Y. (2015). Cybercrime in cloud: Risks and responses in Hong Kong, Singapore. In Ko, R., & Choo, K.(Eds.). (2015). The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues. Waltham, MA: Syngress.

This chapter discusses some of the approaches to cybercrime that are taken by both the Hong Kong and Singapore governments. But, any approach to cybercrime comes with risks to information security and privacy.

Tasks:

1. Part of the Singapore Governments Smart Nation Plan is to deploy a network of smart sensors and cameras at traffic lights, bus stops, rubbish bins, etc. Discuss what you see as the implications for privacy of the Singapore Government's Smart Sensor Network. What effect do you think that this would have on you:

a. If you were a visitor to Singapore?
b. If you were a resident of Singapore?

2. Part of the Singapore Government's Smart Nation Plan is to deploy a series of sensor boxes to act as WiFi hotspots throughout the city. This would allow the introduction of a heterogeneous network where smart phones and other devices could seamless switch between mobile data and WiFi. What effect do you think that the plan would have on you:

a. If you were a visitor to Singapore?
b. If you were a resident of Singapore?
c. If you had sensitive information on your mobile device that you did not want to share?

3. If you were visiting Singapore after the Smart Nation Plan has rolled out, do you think that the use of a digital identity assist you to maintain your privacy while using your mobile phone or devices during your visit? Discuss the reasons for your answer.

4. What steps do you think that you could take to ensure the security and privacy of your digital identity while operating your mobile device(s) in this environment? Discuss each step that you would take along with its advantages and disadvantages.

Reference no: EM131600837

Questions Cloud

Exacerbated by parenting practices and/or family structure : How are these constrained or exacerbated by parenting practices and/or family structure. What unique effects does family structure have on delinquency
Correlation between unemployment and inflation : 1. What is the correlation between unemployment and inflation? 2. In your opinion, do you believe that this correlation is true of the current economy?
The vocational programs in order assist tertiary prevention : beneficial for vocational programs in order assist tertiary prevention. One of the biggest factors that attracts juveniles to the gang style life
Distort trade patterns and lead to inefficiencies : 1. What is the law of comparative advantage, and why is it important in international trade? 2. How do subsidies distort trade patterns and lead.
What step do you think that could take to ensure security : What steps do you think that you could take to ensure the security and privacy of your digital identity while operating your mobile devices in this environment?
The effect of states refusing to develop an exchange : How the health insurance exchanges will affect health care facilities . The effect of states refusing to develop an exchange .
How the overhead costs might have been assigned to each job : Ruakura Printers Co. specialises in wedding invitation packages. How the overhead costs might have been assigned to each job in this case
Discuss the effects of increasing sample size on confidence : Discuss the effects of increasing sample size on confidence intervals and standard errors
Determine minimum model self-priming pump class : A centrifugal pump is to be used to pump all the water from a small excavation that has been flooded. The dimensions of the volume holding water are70 ft long.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Decrypt the ciphertext message uw dm nk qb ek which was

decrypt the ciphertext message uw dm nk qb ek which was encrypted using the digraphic cipher that sends the plaintext

  Write a research paper on network security

Write a research paper on Network Security. Explain the topic briefly, its history and similar "light stuff", where (or how) is it used.

  Discuss what security policies commerce should implement

For Reflective Article Paper 3, select an article that details current methods that are used to successfully prevent identity theft. Discuss what security policies commerce should implement to prevent it from happening.

  Relationships between a trusted and an untrusted network

Discuss biometrics. Identify the most widely used technology and why this is the case. What are the relationships between a trusted and an untrusted network

  Most of the organizations have now adopted or begun to

many organizations have now adopted or begun to offer cloud computing. this type of computing has advantages and

  Describe two potential computer ethics issues associated

Describe two potential computer ethics issues associated with holding computers hostage. Propose two methods that computer users could use to prevent this type of attack.

  Encrypt the plaintext by using vigenere cipher

Encrypt the following Plaintext using Vigenere cipher: Plaintext: stocks market is falling Key : one. Is Vigenere cipher monoalphabetic or polyalphabetic? Why?

  Design a logical and topographical layout of planned network

Design a logical and physical topographical layout of the current and planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia.

  Explain the nature of security assessments is changing

The motivation for security reviews and assessments is changing and, consequently, the nature of security assessments is changing. The practice of risk analysis is relatively less developed in the field of homeland security than in other areas

  Review the sites terms of use and privacy policy

Review the site's terms of use and privacy policy, if any. Are these clear and easily understood, or are they written in legalese?

  Discuss about the asymmetric cryptography

Description of algorithms that implement asymmetric cryptography and strengths / weaknesses of each algorithm atleast two or three algorithms.

  Write a program for recursive algorithm

Consider the following recursive algorithm

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd