Discusses some of approaches to cybercrime that are taken

Assignment Help Computer Network Security
Reference no: EM131597713

Assignment: Privacy and Security Reflextion- Smart Sensor Network

Length: Approx. 2500 words

Task

This assignment is designed to get you to reflect on your personal approach and feelings on information security and privacy.

Read:

Lau, Y. (2015). Cybercrime in cloud: Risks and responses in Hong Kong, Singapore. In Ko, R., & Choo, K.(Eds.). (2015). The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues. Waltham, MA: Syngress.

This chapter discusses some of the approaches to cybercrime that are taken by both the Hong Kong and Singapore governments. But, any approach to cybercrime comes with risks to information security and privacy.

Tasks:

I. Part of the Singapore Governments Smart Nation Plan is to deploy a network of smart sensors and cameras at traffic lights, bus stops, rubbish bins, etc. Discuss what you see as the implications for privacy of the Singapore Government's Smart Sensor Network. What effect do you think that this would have on you:

1. If you were a visitor to Singapore?
2. If you were a resident of Singapore?

II. Part of the Singapore Government's Smart Nation Plan is to deploy a series of sensor boxes to act as WiFi hotspots throughout the city. This would allow the introduction of a heterogeneous network where smart phones and other devices could seamless switch between mobile data and WiFi. What effect do you think that the plan would have on you:

1. If you were a visitor to Singapore?
2. If you were a resident of Singapore?
3. If you had sensitive information on your mobile device that you did not want to share?

III. If you were visiting Singapore after the Smart Nation Plan has rolled out, do you think that the use of a digital identity assist you to maintain your privacy while using your mobile phone or devices during your visit? Discuss the reasons for your answer.

IV. What steps do you think that you could take to ensure the security and privacy of your digital identity while operating your mobile device(s) in this environment? Discuss each step that you would take along with its advantages and disadvantages.

As a guide, your word limit for this assignment should be around 2,500 words.

Reference no: EM131597713

Questions Cloud

Define diverse characteristics-background of the assignees : An organisation was established 3 years ago and has earned an outstanding reputation throughout Singapore.
What is the equilibrium of this simultaneous move game : If they both hire consultants, they cancel each other out and they expect to get half the pot minus the consulting costs.
The nursing management of client health : Assess your knowledge of foundational concepts essential to the nursing management of client health by taking the interactive quiz.
Examine the business referencing style : Compare and contrast an aspect of employment relations in any two Southeast Asian countries. What are the causes of the differences between the two?
Discusses some of approaches to cybercrime that are taken : This chapter discusses some of the approaches to cybercrime that are taken by both the Hong Kong and Singapore governments.
What attributes would lead to success in business : The supply of workers in various labor markets differs substantially and affects staffing. The textbook identifies 3 types of labor markets.
Five main reasons that firms expand : What are the five main reasons that firms expand into international markets?
Determine the total expense recognized by ftcap : Determine the total expense recognized by Ftcap in each year's income statement and the lease liability reported in each year-end balance sheet
Provide a scenario and research question : What are some considerations you would need to take in designing the research as related to your hypothetical research question and selected method?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Describe mckinnon in the context of the frameworks

Describe McKinnon in the context of the frameworks and theories of cyber-crime and cyber criminals discussed in the classroom. The questions to be researched are the efforts to extradite McKinnon to the United States a political ploy.

  Explain how an ip packet might become duplicated

Explain how an IP packet might become duplicated and arrive twice at its destination.

  Discuss the role of the federal government

CSEC 670 Assignment - How do the emerging cyber security technologies that you identified coupled with prioritized research and development improve cyber security?

  Explain the following in terms of ict - worms and malware

In about 300 words, explain the following in terms of ICT - Worms and Malware

  Identify the current software security threats

The CISO often thinks that The Open Web Application Security Project (OWASP) is a good source to identify the current software security threats.

  Summarize the current state of web application security

Summarize the current state of Web application security for your Board of Directors to understand. Determine any common themes that need to be addressed specific to the Web security.

  Staff to maintain integrity of the network

Offsite storage like Cloud technology can allow access to all critical information without invests additional resource to maintain the storage solutions and the staff to maintain integrity of the network.

  How would use address the given troublesome trend

How can one protect against virus outbreaks in an organization? What are the common causes of this problems? How would use address this troublesome trend?

  Which type of computer crime describes actions

Which type of computer crime describes actions in which the computer is used only to further a criminal end? In other words, the computer or data contained therein is not the object of the crime.

  Provide data security technologies

Explain what viruses are, how it occurs and the types of cybercrimes that can result from it, and how to better protect computers.

  Discuss specific malware and social engineer attacks

Discuss specific malware, social engineer, or any other type of attacks you would deploy to achieve your desired goals

  Targeted marketing and mass marketing

Distinguish between targeted marketing and mass marketing and explain what led to the rise of each. Describe the different market-segmenting strategies companies pursue and why.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd