Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Assessment item 1 back to top Privacy and Security Reflection Value: 10% Due Date: 30-Jul-2018 Return Date: 21-Aug-2018 Length: Approx. 3000 words Submission method options: Alternative submission...

1 answer below »
Assessment item 1
ack to top
Privacy and Security Reflection
Value: 10%
Due Date: 30-Jul-2018
Return Date: 21-Aug-2018
Length: Approx. 3000 words
Submission method options: Alternative submission method
Task
ack to top
This assignment is designed to get you to reflect on your personal approach and feelings on information security and privacy.
Read: 
Lau, Y XXXXXXXXXXCybercrime in cloud: Risks and responses in Hong Kong, Singapore. In Ko, R., & Choo, K.(Eds XXXXXXXXXXThe Cloud Security Ecosystem: Technical, Legal, Business and Management Issues. Waltham, MA: Syngress.
This chapter discusses some of the approaches to cybercrime that are taken by both the Hong Kong and Singapore governments. But, any approach to cybercrime comes with risks to information security and privacy.
Tasks: 
Assume that an Australian State Government has reviewed the Singapore Government’s Smart Nation Plan and has decided to implement their own Smart State Plan. This will initially consist of a network of smart sensors and cameras at traffic lights, bus stops, ru
ish bins, etc. in their CBD to monitor citizens behaviour and address street crime.
1. Discuss what you see as the personal and ethical implications for your privacy of the proposed Government’s Smart Sensor Network by looking at:
a. The types or categories of people affected by this proposal, 
. What behavioural changes you might expect to see from normal citizens,
c. Would you expect to see changes in individual behaviours, such as choice of activities, changes in time schedules, etc.
The next part of the Government’s plan is to deploy a Smart WiFi Network which will consist of a series of sensor boxes to act as WiFi hotspots throughout the city. This would allow the introduction of a heterogeneous network where smart phones and other devices could seamless switch between mobile data and WiFi.
2. Discuss what you see as the personal and ethical implications for your privacy of the proposed Government’s Smart WiFi Network by looking at:
a. The types or categories of people affected by this proposal,
. What behavioural changes you might expect to see from normal citizens using their mobile devices in the CBD,
c. Would you expect to see changes in individual behaviours, such as choice of activities, changes in time schedules, etc.
d. What are the implications for you If you had sensitive information on your mobile device that you did not want to share?
The Smart State Plan will also enrol all citizens with a Digital Identity to ensure that they can co
ectly be identified and access services provided by the state both electronically and physically.
3. If you were visiting the State Capital after the Smart State Plan has rolled out, do you think that the use of a digital identity would assist you to maintain your privacy while using your mobile phone or devices during your visit? Discuss the reasons for your answer.  
4. What steps do you think that you could take to ensure the security and privacy of your digital identity while operating your mobile device(s) in this environment? Discuss each step that you would take along with its advantages and disadvantages.   
Each question is worth 25 marks and your overall score will be scaled out of 10. As a guide, your word limit for this assignment should be around 3,000 words.  
Rationale
ack to top
This assessment task will assess the following learning outcome/s:
· be able to critically analyse the legal, ethical and business concerns for the security and privacy of data to be deployed to the cloud.
Marking criteria and standards
ack to top
 
    
    
    
    
    
    
    Question
    HD
    DI
    CR
    PS
    FL
        Q1. Smart Sensors (25 marks)
        Comprehensive exploration of privacy and ethical issues from both personal and behavioural viewpoints
        Thorough exploration of privacy and ethical issues with good personal and behavioural viewpoints
        Good exploration of privacy and ethical issues with some  personal and behavioural viewpoints
        Adequate discussion of privacy and ethical issues with some personal and behavioural viewpoints
        Incomplete or inadequate  exploration of privacy/ethical issues that does not discuss personal and behavioural viewpoints
        Q2. WiFi hotspots (25 marks)
        Comprehensive exploration of security & sensitive data issues from both personal and behavioural viewpoints
        Thorough exploration of security & sensitive data issues with many personal and behavioural viewpoints
        Good exploration of security & sensitive data issues with some personal and behavioural viewpoints
        Adequate discussion of security & sensitive data issues with some personal and behavioural viewpoints
        Inadequate or incomplete discussion of security & sensitive data issues that does not discuss personal and behavioural viewpoints
        Q3. Digital Identity (25 marks)
        Comprehensive discussion of issues with use of digital identity 
        Thorough discussion of issues with use of digital identity  
        Good discussion of issues with use of digital identity  
        Adequate discussion of issues with use of digital identity  
        Incomplete or inadequate discussion of issues with use of digital identity  
        Q4. Security & privacy controls (25 marks)
        Comprehensive exploration of steps to take to enhance security and privacy     of mobile devices
        Thorough exploration of steps to take to enhance security and privacy  of mobile devices
        Good exploration of steps to take to enhance security and privacy  of mobile devices
        Adequate exploration of steps to take to enhance security and privacy  of mobile devices
        Incomplete or inadequate exploration of steps to take to enhance security and privacy     of mobile devices
        Presentation
        Up to 5 marks may be deducted for poor presentation, spelling and grammar
Answered Same Day Jul 27, 2020

Solution

Ankit answered on Jul 28 2020
139 Votes
Student_Id
Student_Name
Privacy and Security Reflection
Introduction
Singapore is positioned as a standout amongst the most wired and cyber ready countries on the planet as it is globally positioned the most noteworthy as far as normal per capita misfortune per casualty of cybercrime.
The Internet usage has multiplied and influenced the living of numerous individuals particularly so in Singapore, which
ags a high Internet entrance rate, with 87% of its populace having
oadband access. It prepared access to remote, area based, cloud computing and dependably on advancements, the use of Internet associated gadgets is getting to be unavoidable in everyday life. [Jiow 2015]
Cybercrime is characterized as any infringement of criminal law that includes a learning of PC innovation for their execution, examination, or indictment. The PC is fundamental to the meaning of cybercrime. It can be the protest (focus of the wrongdoing) or subject which the wrongdoing occu
ed of the cyber crime. These violations are common sense rules named as new wrong doings utilizing new apparatuses. The PC is additionally the instrument or apparatus used to sustain a wrongdoing, and these demonstrations are delegated old violations utilizing new devices. [Jiow 2015]
The main purpose of this document is to focus on the methodologies to cybercrime that are taken by both the Hong Kong and Singapore governments. We will focus on the personal and ethical implications for their privacy of the proposed Government’s Smart Sensor Network.
The document also focuses on the personal and ethical implications for their privacy of the proposed Government’s Smart WiFi Network.
Approaches to cybercrime taken by both the Hong Kong and Singapore governments
The Hong Kong and Singapore governments confront an undeniably difficult security scene - new innovation introducing benefits for residents, new and rising dangers to fight with, and critical strain to ensure information. In any case, how genuine are the dangers postured to people in general part by information
eaks and other digital dangers? As indicated by gauges, cyberattacks cost the worldwide economy $400 billion every year. People in general part is an essential target, yet in what capacity can open area associations—huge and little—oversee advanced dangers?
By building up a hearty, proactive cyber security approaches, government offices will be better prepared to get ready for, anticipate and resolve computerized crimes into what's to come by following approaches:
1) Do Risk assessment: The Government may ca
y out a risk assessment to find points of highest
eaches and potential outcomes of an attack. They comprehend the most exceedingly bad and in all probability situations to build resistances. They also guarantee exchange between securities. [Balakrishnan]
2) Follow analytics based approach: Compelling cyber security can never again depend on an "entryways and watchmen" approach. The advanced analytics approach is very beneficial for cyber threat distinguishing proof and insight.
3) Put money in cyber security talent: The different public service firms are winding up short on the co
ect skills and capabilities to fight off cyber crime threats. Public service pioneers must allot assets to draw in and construct a solid cyber security group. [Balakrishnan]
4) Maximize stakeholder collaboration: Government representatives want to comprehend the risks and security protocols when utilizing cell phones or working in the cloud. There is need to instruct the representatives about cyber security so everybody can have their influence in protecting information. Also there is need to work with peer associations, the scholarly community and the private area to limit hazard.
5) Cyber Security approach is device: This is not enough to do crisis response plan. There is need to do a proactive data security strategy. Also Prioritisation is must. [Shah 2017]
According to Singapore government, the ongoing activities to fortify cyber security are a piece of the government's progressing endeavours to connect with people, the private division and colleges to raise security mindfulness and make the co
ect skills and outlook to wind up a Smart Nation. With the administrative, business and notoriety danger of cyber security problems in Singapore proceeding to develop, associations must actualize a vigorous cyber security system comprising of a
angements, strategies and rules to guarantee ID, insurance and discovery of cyber security
eaches and satisfactorily react and recoup from cyber security occu
ences.
Notice of, and commitment with, buyers, workers, influenced gatherings and controllers are additionally basic factors in relieving business, legitimate and reputational chance from digital
eaks. It is additionally important that associations set up a digital security
eak reaction and have a co
espondences program set up to guarantee that both administrative necessities and partner desires are met. [Balakrishnan]
Personal and ethical implications for their...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here