Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Assessment item 1 back to top Privacy and Security Reflection Value: 10% Due Date: 30-Jul-2018 Return Date: 21-Aug-2018 Length: Approx. 3000 words Submission method options: Alternative submission...

1 answer below »
Assessment item 1
ack to top
Privacy and Security Reflection
Value: 10%
Due Date: 30-Jul-2018
Return Date: 21-Aug-2018
Length: Approx. 3000 words
Submission method options: Alternative submission method
Task
ack to top
This assignment is designed to get you to reflect on your personal approach and feelings on information security and privacy.
Read: 
Lau, Y XXXXXXXXXXCybercrime in cloud: Risks and responses in Hong Kong, Singapore. In Ko, R., & Choo, K.(Eds XXXXXXXXXXThe Cloud Security Ecosystem: Technical, Legal, Business and Management Issues. Waltham, MA: Syngress.
This chapter discusses some of the approaches to cybercrime that are taken by both the Hong Kong and Singapore governments. But, any approach to cybercrime comes with risks to information security and privacy.
Tasks: 
Assume that an Australian State Government has reviewed the Singapore Government’s Smart Nation Plan and has decided to implement their own Smart State Plan. This will initially consist of a network of smart sensors and cameras at traffic lights, bus stops, ru
ish bins, etc. in their CBD to monitor citizens behaviour and address street crime.
1. Discuss what you see as the personal and ethical implications for your privacy of the proposed Government’s Smart Sensor Network by looking at:
a. The types or categories of people affected by this proposal, 
. What behavioural changes you might expect to see from normal citizens,
c. Would you expect to see changes in individual behaviours, such as choice of activities, changes in time schedules, etc.
The next part of the Government’s plan is to deploy a Smart WiFi Network which will consist of a series of sensor boxes to act as WiFi hotspots throughout the city. This would allow the introduction of a heterogeneous network where smart phones and other devices could seamless switch between mobile data and WiFi.
2. Discuss what you see as the personal and ethical implications for your privacy of the proposed Government’s Smart WiFi Network by looking at:
a. The types or categories of people affected by this proposal,
. What behavioural changes you might expect to see from normal citizens using their mobile devices in the CBD,
c. Would you expect to see changes in individual behaviours, such as choice of activities, changes in time schedules, etc.
d. What are the implications for you If you had sensitive information on your mobile device that you did not want to share?
The Smart State Plan will also enrol all citizens with a Digital Identity to ensure that they can co
ectly be identified and access services provided by the state both electronically and physically.
3. If you were visiting the State Capital after the Smart State Plan has rolled out, do you think that the use of a digital identity would assist you to maintain your privacy while using your mobile phone or devices during your visit? Discuss the reasons for your answer.  
4. What steps do you think that you could take to ensure the security and privacy of your digital identity while operating your mobile device(s) in this environment? Discuss each step that you would take along with its advantages and disadvantages.   
Each question is worth 25 marks and your overall score will be scaled out of 10. As a guide, your word limit for this assignment should be around 3,000 words.  
Rationale
ack to top
This assessment task will assess the following learning outcome/s:
· be able to critically analyse the legal, ethical and business concerns for the security and privacy of data to be deployed to the cloud.
Marking criteria and standards
ack to top
 
    
    
    
    
    
    
    Question
    HD
    DI
    CR
    PS
    FL
        Q1. Smart Sensors (25 marks)
        Comprehensive exploration of privacy and ethical issues from both personal and behavioural viewpoints
        Thorough exploration of privacy and ethical issues with good personal and behavioural viewpoints
        Good exploration of privacy and ethical issues with some  personal and behavioural viewpoints
        Adequate discussion of privacy and ethical issues with some personal and behavioural viewpoints
        Incomplete or inadequate  exploration of privacy/ethical issues that does not discuss personal and behavioural viewpoints
        Q2. WiFi hotspots (25 marks)
        Comprehensive exploration of security & sensitive data issues from both personal and behavioural viewpoints
        Thorough exploration of security & sensitive data issues with many personal and behavioural viewpoints
        Good exploration of security & sensitive data issues with some personal and behavioural viewpoints
        Adequate discussion of security & sensitive data issues with some personal and behavioural viewpoints
        Inadequate or incomplete discussion of security & sensitive data issues that does not discuss personal and behavioural viewpoints
        Q3. Digital Identity (25 marks)
        Comprehensive discussion of issues with use of digital identity 
        Thorough discussion of issues with use of digital identity  
        Good discussion of issues with use of digital identity  
        Adequate discussion of issues with use of digital identity  
        Incomplete or inadequate discussion of issues with use of digital identity  
        Q4. Security & privacy controls (25 marks)
        Comprehensive exploration of steps to take to enhance security and privacy     of mobile devices
        Thorough exploration of steps to take to enhance security and privacy  of mobile devices
        Good exploration of steps to take to enhance security and privacy  of mobile devices
        Adequate exploration of steps to take to enhance security and privacy  of mobile devices
        Incomplete or inadequate exploration of steps to take to enhance security and privacy     of mobile devices
        Presentation
        Up to 5 marks may be deducted for poor presentation, spelling and grammar
Answered Same Day Jul 27, 2020

Solution

Ankit answered on Jul 29 2020
149 Votes
Student_Id
Student_Name
Privacy and Security Reflection
Introduction
Government’s Smart Nation Plan is an intense new activity to make financial development and enhance the personal satisfaction of individuals by empowering neighbourhood improvement and saddling innovation as a way to make keen results for subjects.
In accordance with the smart city gets ready for better government supported organization conveyance, official firms will use on latest advancement, cloud methodologies and information investigation, and additionally rising advances, for example, IoT sensors and mechanical autonomy, to great envision and address residents' issues. Brilliant Nation is a considerable measure of potential outcomes, I think, a great deal of innovations, especially for youngsters. That is our nation, this is our future. Smart City plan expect to give extensive variety of advantages, for example, better transportation, waste management, energy management, which will impressively enhance the expectations for everyday comforts for the residents.
A smart nation is an u
anized te
itory where numerous parts participate to accomplish reasonable results through examination of relevant continuous data shared among part particular data and operational innovation frameworks. [Chla 2016]
Singapore is situated as a champion among cyber ready and wireless country on the earth.The Cyber security Strategy plans of Singapore government is to make a flexible and confided in cyber condition. Cyber security is an objective and an option both. Due to cutting edge framework and an exceptionally gifted IT staff, Singapore is very much situated to fa
icate an energetic cyber security eco- system. To anchor their carefully empowered economy and society, the Government will work with scratch partners – private segment administrators and the cyber security network – to fortify the versatility of our CIIs.
In this document we will focus on “the personal and ethical implications for their privacy of the proposed Government’s Smart Sensor Network”. The other purpose of document is to focus on “the security challenges in smart city plan taken by both the Hong Kong and Singapore governments”. The document also focuses on “the personal and ethical implications for their privacy of the proposed Government’s Smart WiFi Network”.
Security and privacy challenges in smart city plan
Security and privacy is an essential human right and is ensured by national laws in various manners. Security concerns incorporate the worthy practices with respect to getting to and revealing individual and touchy data about a man. Smart city technology catch information identifying with all types of security and definitely extends the volume, range and granularity of the information being produced about individuals and spots. Due to cutting edge framework and an exceptionally gifted IT staff, Singapore is very much situated to fa
icate an energetic cyber security eco- system. To anchor their carefully empowered economy and society, the Government will work with scratch partners – private segment administrators and the cyber security network – to fortify the versatility of our CIIs.
Security can be debilitated and
oken by various practices which are ordinarily regarded as inadmissible, anyway are a piece of activities in a
illiant city eco framework.
Surveillance: Watching, following, tuning in to or saving a man's tasks
Aggregation: Gathering of different parts of information about a man to distinguish a pattern or example of exercises.
Data spillage: absence of information security a
angements can prompt spillage or shameful access of touchy data
Extended utilization: utilization of information gathered for period longer than expressed or for aims other than the expressed reason without the subject's assent
Insecure Hardware is one of the real wo
ies about smart city sensors in the assets; structures etc. are unreliable and not checked completely. Inferable from need of institutionalization of IoT gadgets, the sensors are inclined to hacking. Famous people can hack the sensors furthermore, feed counterfeit information, causing signal disappointments, framework. [Chla 2016]
According to government of Singapore, they have reliably considered cyber dangers important and grew convenient reactions. Their cyber security travel began 10 years prior with the primary smart nation plan. The smart nation plan was a great push to anchor Singapore's computerized condition and fortify open area cyber security capacities. Due to managerial, organizational, reputation etc.threat of cyber security issues in country continuing to create, affiliations may complete a fiery digital privacy framework involving courses of action, methodologies or guidelines to ensure ID, protection and revelation of digital privacy
eaks, palatably respond and recover from digital privacy events. Security-by-Design is a strategy in the framework improvement lifecycle procedure to guarantee that their softwares and frameworks are fa
icated, conveyed, kept up, updated and discarded safely.
Singapore is changing to end up a Smart Nation, where Singaporeans are engaged by innovation to lead important and satisfying...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here