Cloud Security: Impacts, Behavioral Changes, and Risk Mitigation

Verified

Added on  2023/06/08

|10
|2244
|418
AI Summary
This article discusses the impacts of cloud security on citizens, behavioral changes, and risk mitigation measures. It also covers the types of people affected by WIFI installation and the advantages and disadvantages of implementing firewall and fingerprint scanning.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running Head: CLOUD SECURITY
Cloud Security
Name of the Student
Name of the University
Author Note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1CLOUD SECURITY
Table of Contents
PART I.............................................................................................................................................2
Affected People...........................................................................................................................2
Behavioral changes......................................................................................................................2
Change in activities......................................................................................................................3
PART II...........................................................................................................................................3
Types of people affected by WIFI installation............................................................................3
Behavioral change.......................................................................................................................4
Rescheduling of activities............................................................................................................4
Risk mitigation.............................................................................................................................5
TASK III..........................................................................................................................................5
TASK IV..........................................................................................................................................6
Installing firewall.........................................................................................................................6
Advantages of using firewall...................................................................................................6
Disadvantages of using firewall...............................................................................................6
Implementing fingerprint scanning..............................................................................................6
Advantage of implementing Fingerprint scanning..................................................................6
Disadvantages..........................................................................................................................7
References........................................................................................................................................8
Document Page
2CLOUD SECURITY
PART I
Affected People
Due to the implementation of Smart State Plan by the government of Singapore, both sets
of activist and non-activist citizens will be affected. There will be a huge need of transferring
from analog and manual system to digital systems. Cost incurred in this projection of digital
system is high initially (Yamamura, Fan & Suzuki, 2017). This leads to the fact that people who
are not very self-sufficient financially cannot transform themselves from manual platform to
digital platform. Hence they will genuinely face issues. On the other hand citizens who are well
established will also be affected in a positive node. Leading life will get easier for them. Task of
security providers will get easier as activity list of the entire city is under scrutiny of the CCTV.
This helps government to have a control over the prosecution of activities in a more efficient
manner. Citizens with illegal intentions will be affected the most as activity of each and every
citizen is marked. This leads to the fact imposters cannot function efficiently (Maye, 2018). This
decreases the crime rate in the city. This factor acts as a positive node for both the citizens as
well as the security department of the city. Then again it gets easier for cyber criminals to get
access too unauthenticated databases and create conflict. As data of every will be available in the
cloud system, cyber criminals can get sufficient data to access the portals of the genuine citizens
and affect them both socially and financially.
Behavioral changes
Work culture of citizens face a massive change in this process. After implementation of
smart city plan, citizens of Singapore will be provided with higher efficiency in the functioning
of the process, this process will increase the proficiency of citizens of Singapore (Angelidou,
2014). Time required in processing of human management will decrease. Due to the fact that
Document Page
3CLOUD SECURITY
manual and analog systems will get obsolete, identity crisis will be a regular issue hence people
will need to get accustomed with the unique ids they will be provided by the government of
Singapore in order to do any kind of business processing (Cocchia, 2014). In the beginning
mistakes will be committed by citizens in huge rate as none are accustomed with the process of
digitalization.
Change in activities
There will be a major change in the lifestyle of the people residing in the city. This will, help
people in travelling sector as well as in the banking sector. People will no longer require to stand
in queue for performing their financial works (Wagner, Brandt & Neumann, 2014). This also
ensures the fact that the processing of their banking issues can be done from smart phones that
they will need to buy to complete any kind of task in a smart city. This will change the overview
of the working process.
PART II
Types of people affected by WIFI installation
Young generation of the society will be affected in a positive note. This takes into
consideration the fact that smart phones that will be bought by the citizens of Singapore will be
utilized properly. They can gain access to data from any place in the city (Khansari, Mostashari
& Mansouri, 2014). Corporate sectors will be affected in a positive node. Corporate sectors
needed to install data connectivity in their office premises regularly. Government providing
internet in the entire city will ensure the fat that corporate sectors do not need to install internet
serving centers separately. This will affect the process in a better way and the spending can be
made in manufacturing process of the organization leading to increase in turn-over of the
organization.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4CLOUD SECURITY
Behavioral change
Most affected section of the society are the corporate sectors of Singapore. Corporate
sectors will enjoy the 24/7 internet in a week. This will ensure the fact that manufacturing rate
will increase. Due to the fact that processing can be done even after shift time of the employees
of the organization. Employees can even earn higher than their expected income by performing
overtime from their residential places. This will lead to the fact earning scope of the employees
will increase. General Citizens will have a change in their behavioral terminologies as
processing in market places will get easier due to the introduction of the WIFI system in the
entire city (Marvin, Luque-Ayala & McFarlane, 2015). Telecommunication companies will be
affected adversely as they will suffer a huge loss due to the fact that the data packages will not be
purchased anymore and calling can also be done with the help of internet, hence business scope
of telecommunication companies are affected to a huge extent. In other hand citizens of the smart
city get benefitted as they can save money due to having an access to internet whole day.
Rescheduling of activities
Yes, I feel there is a change in scheduling of activities in the processing of regular life
style. This is due to the fact that citizens of Singapore can get access to the data that is provided
by the government. The fact that it requires less time in completion of tasks in government
places as identity of individuals are already stored with the help of unique ids, which facilitates
the processing of the work. Luxury in time can be afforded by people as time taken in
completion of the work in government places will be least (Gabrys, 2014). Proper security
systems are installed in the process of the computing systems as imposters can gain access data
that are stored in the database of the government system. Security of personal data is in hands of
citizens, leading to the fact that they need to install firewall in their computing system for
Document Page
5CLOUD SECURITY
properly securing data present in their portals. These are the extra activities that the citizens of
Singapore perform in order to enjoy the benefits of global WIFI in their city (Kim, 2018).
Risk mitigation
In case I have important information in my smart phone I would like to secure my phone
so that imposters do not get access to my portal. This can be done by installing firewall in the
mobile devices. Firewall will acts as a barrier between the imposters and the data that are present
in the portal of the citizens. In case firewall does not act efficiently, usage of antivirus software is
made in order to keep portals protected from malicious codes that are generated in the process. I
will also apply security measures namely fingerprint sensors and password (Hartma et al., 2017).
This will also provide security to the data that are present in the data center.
TASK III
I do not feel that implication of digitalization will help in maintaining identity of individual in
smart city. I consider digitalization to be a threat to identity of the organization. This is due to the
fact that data of each and every individual is stored in a framework of government. This leads to
the fact that imposters can easily get access to data that are stored in the data center. Encryption
of data is one of the most important factor that will help individuals to keep their data protected.
In case, imposters get access to the data that are present in data center they will represent the
genuine citizen and act on behalf of them (Kim, 2018). This will lead to conflicts between other
citizens of the city. Imposters can also gain access to financial portals of the genuine citizen and
harm the citizen financially as well. These are the reasons I feel protection measures must be
taken in order to stay protected from the imposters.
Document Page
6CLOUD SECURITY
TASK IV
Implementation of steps that will help in maintaining the security of devices are as follows: -
Installing firewall
Advantages of using firewall
Major advantages of using firewall for protecting the data center are as follows: -
Overall protection of the system: Firewall provides an overall protection of the data base.
This includes the fact that imposters who are trying to get access to the data base will not
be able to approach data that is stored in the data base. Stopping remote logging: Firewall is the only process by which remote logging can be
mitigated.
Disadvantages of using firewall
Major disadvantages of using firewall are as follows: -
Lack of robustness: due to lack of robustness firewall cannot protect the data center from
malicious attacks. This is the reason that introduction of antivirus software was needed.
Lack of innovation: due to the fact that no innovation is brought in the system, firewall
cannot protect computing system against new threats, leading to the fact that it is not very
efficient in nature.
Implementing fingerprint scanning
Advantage of implementing Fingerprint scanning
Major advantage of implementing finger print scanning are as follows: -
Robustness: Implementing fingerprint scanner is one of the most important aspect of
providing security to the data center. By implementing this process imposters can never

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7CLOUD SECURITY
gain access to the database as fingerprint is unique for every individual (Ringenson &
Höjer, 2016)
2 factor security: 2 factor security is one of the most secured way to protect the data
present in the data center
Disadvantages
Major disadvantage of this system is that these scanners might not act efficiently and not
recognize the genuine citizens, leading to the fact that they cannot gain access to the system.
Document Page
8CLOUD SECURITY
References
Angelidou, M. (2014). Smart city policies: A spatial approach. Cities, 41, S3-S11.
Cocchia, A. (2014). Smart and digital city: A systematic literature review. In Smart city (pp. 13-
43). Springer, Cham.
Gabrys, J. (2014). Programming environments: environmentality and citizen sensing in the smart
city. Environment and Planning D: Society and Space, 32(1), 30-48.
Hartama, D., Mawengkang, H., Zarlis, M., & Sembiring, R. W. (2017, September). Smart City:
Utilization of IT resources to encounter natural disaster. In Journal of Physics:
Conference Series (Vol. 890, No. 1, p. 012076). IOP Publishing.
Khansari, N., Mostashari, A., & Mansouri, M. (2014). Impacting sustainable behavior and
planning in smart city. International Journal of Sustainable Land Use and Urban
Planning, 1(2).
Kim, K. G. (2018). Implementation of Climate Smart City Planning: Global Climate Smart City
Platform Solution. In Low-Carbon Smart Cities (pp. 285-323). Springer, Cham.
Kim, K. G. (2018). The real-time city? Big data and smart urbanism. GeoJournal, 79(1), 1-14.
Marvin, S., Luque-Ayala, A., & McFarlane, C. (Eds.). (2015). Smart urbanism: Utopian vision
or false dawn?. Routledge.
Maye, D. (2018). ‘Smart food city’: Conceptual relations between smart city planning, urban
food systems and innovation theory. City, Culture and Society.
Document Page
9CLOUD SECURITY
Ringenson, T., & Höjer, M. (2016). Smart City Planning and Environmental
Aspects. Proceedings of the ICT for Sustainability, 159-166.
Wagner, S., Brandt, T., & Neumann, D. (2014). Smart city planning-developing an urban
charging infrastructure for electric vehicles.
Yamamura, S., Fan, L., & Suzuki, Y. (2017). Assessment of urban energy performance through
integration of BIM and GIS for smart city planning. Procedia engineering, 180, 1462-
1472.
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]