Privacy and security reflection Assessment 1

Privacy and security reflection Assessment 1

Value: 10%

Due date: 8-Aug-2017

Return date: 01-Sep-2017

Length: Approx. 3000 words

Assignment help

Buy Assignment help for this assignment

Email: [email protected]

Price 120 AUD

Submission method options

Alternative submission method

Task

This assignment is designed to get you to reflect on your personal approach and feelings on information security and privacy.

Read:

Lau, Y. (2015). Cybercrime in cloud: Risks and responses in Hong Kong, Singapore. In Ko, R., & Choo, K.(Eds.). (2015). The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues. Waltham, MA: Syngress.

This chapter discusses some of the approaches to cybercrime that are taken by both the Hong Kong and Singapore governments. But, any approach to cybercrime comes with risks to information security and privacy.

Tasks:

  1. Part of the Singapore Governments Smart Nation Plan is to deploy a network of smart sensors and cameras at traffic lights, bus stops, rubbish bins, etc. Discuss what you see as the implications for privacy of the Singapore Government’s Smart Sensor Network. What effect do you think that this would have on you:

     

     

     

    1. If you were a visitor to Singapore?
    2. If you were a resident of Singapore?
  2. Part of the Singapore Government’s Smart Nation Plan is to deploy a series of sensor boxes to act as WiFi hotspots throughout the city. This would allow the introduction of a heterogeneous network where smart phones and other devices could seamless switch between mobile data and WiFi. What effect do you think that the plan would have on you:

     

     

     

    1. If you were a visitor to Singapore?
    2. If you were a resident of Singapore?
    3. If you had sensitive information on your mobile device that you did not want to share?
  3. If you were visiting Singapore after the Smart Nation Plan has rolled out, do you think that the use of a digital identity assist you to maintain your privacy while using your mobile phone or devices during your visit? Discuss the reasons for your answer.
  4. What steps do you think that you could take to ensure the security and privacy of your digital identity while operating your mobile device(s) in this environment? Discuss each step that you would take along with its advantages and disadvantages.

Each question is worth 25 marks and your overall score will be scaled out of 10. As a guide, your word limit for this assignment should be around 3,000 words. 
IT Assignment Help

Rationale

This assignment aligns with the following learning outcomes:

  • be able to examine the legal, business and privacy requirements for a cloud deployment model;
  • be able to evaluate the risk management requirements for a cloud deployment model;

Comments

comments

About the author

HND Assignment Help is the #1 Assignment help company offering hnd business management assignments at most affordable prices and 100% plagiarism free content. Contact for hnd business assignments at [email protected] We are pioneer in btec hnd assignments since more than 7 years and have provided btec hnd assignment help for students around the world. Login http://www.hndassignmenthelp.co.uk for more details.