ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Cloud Security and Services

Verified

Added on  2023/06/10

|10
|2942
|400
AI Summary
This article discusses the implementation of smart sensors, the impact of Wi-Fi on tourism, the role of digital identity, and steps to ensure digital identity security. It explores the benefits and issues of these technologies and their impact on citizens, businesses, and governments. The article also highlights the need for security and privacy in the digital age.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: CLOUD SECURITY AND SERVICES
Cloud Security and Services
Name of the Student
Name of the University
Author Note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1CLOUD SECURITY AND SERVICES
Q1. Issues arises with implementation of Smart Censor
A smart sensor device that takes data from the environment, process it to build the
computer resources to perform predefined functions for detecting specific input, and then
redirects. The problems that will arise :
Smart sensors facilitate further data collection with automated and accuracy
collection of environmental data with less incorrect noise amid the accurately
recorded data (Cheng et al., 2013).
These devices are being used for controlling and monitoring mechanisms in a
broad range of environments including battlefield inspection, smart grid,
examination and an immense number of science applications.
As technologies, bring both profits and loss for the people. The people who are
not aware of the technologies will not be able to operate and cope up with the
smart sensor technology.
They will always require smart people to be operated by.
Not every citizen can afford to implement the smart sensor, as it will require huge
money. The large-scale business will be able to adopt it only, as they will have
sufficient amount of money for implementing this.
Benefits:
This implementation of technology will also bring some behavioral change among
the people (Grassi, Garce, & Fenton, 2017).
The entire citizen will be under CCTV surveillance, therefore they will be much
careful with their activities and this will increase the safety of the citizens. They
will also try to maintain a descent speed limit. The crime rates will decrease in the
Document Page
2CLOUD SECURITY AND SERVICES
society with the implementation. Younger citizens are supposed to enjoy the
facilities more than the older people do.
According to me, the punctuality will increase among the people and this will
systematize the people of the Australia and will help the citizen to be on time.
People will be able to enjoy their night outs without any tension, as this system
will increase the security (Css.edu., 2018).
According to me, this plan of developing Smart State will be very much beneficial for
the citizens but likewise will face many ethical issues with it. The first issue that will arise, is
regarding the privacy of the citizens. Smart sensors will gather the information from the
environment and from the citizen. The main question is the safety of this data collected by the
smart sensors (Budde et al., 2013). The protection of this information is in doubt as this can lead
to hacking .Hacking of this information can lead to expose of the data about the citizen and this
can cause major threat for the citizens. One more issue that is ethical is that, the systems installed
for smart sensors can be easily altered physically. In addition, it is not sure that this smart sensors
hardware will always give the perfect output. It may give wrong information that can lead to
troubles for the citizens. The concept of the smart sensor has a big advantage for the network
according to me. These networks are therefore needed to be incorporated perfectly without any
inner flaws and needs high security so that it cannot be hacked easily by the hackers.
Q2. Wi-Fi Facility:
Nowadays Wi-Fi had become a necessary requirement for people. A city moving towards
digitization has incorporated wifi, as the basic need .This is another way of connecting the
Document Page
3CLOUD SECURITY AND SERVICES
people all over the world. In case the people cannot access wifi and are at distant from the
location where wifi located they can access to Wi-Fi hotspots. Government of Australia is
moving towards connecting people and developing country and has incorporated Wifi network.
This network is a type of diverse network. A diverse network consists of different types of
operating structure and makes the independent network for the operating system. The use of
these networks enables everyone to access net and helps getting their works done. Access to Wi-
Fi for free can impact the tourism industry as well, and this can turn into very advantageous for
the tourism business (Magno et al., 2015). As everyone nowadays loves to stay updated and they
love to share their daily moments and activities with their family and friends. Moreover, they can
get current updates about their travel and regarding hotels. As a result, they prefer destination
with wifi so that they can completely enjoy their tour, and at any point if they get stuck, internet
is always there to help them out (Ilyas, & Mahgoub, 2016). Thus, this brings a huge profit
towards the country and uplifts the economy. However, there are both positive and negative
effect everything, likewise this also have some adverse effect on some citizen. It is necessary to
have an electronic device which will allow them to connect to the wifi network , without this , no
one can connect with the wifi signals (Ransing & Rajput, 2015) . But there are still many people
who does not have such devices or are not capable of using such devices and some are not able
to buy them .The scheme includes covering the city with wifi, this means that future will have
only works done on the internet. According to me, I appreciate the initiative taken by the
government in digitizing the city by incorporating wifi, but similarly it should also incorporate
some facilities that will help those who do not have the facility to access the device (Mu, Cui &
Rao, 2013). I believe that having access to free wifi will further increase the chance of getting
hack increase. For the security purpose, I suggest the government should implement the habit of

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4CLOUD SECURITY AND SERVICES
using VPN connection while connecting to an unknown connection. Thus this will increase the
security from threats and hackers, and hence our data will be encrypted no one will be able to
access our personal information(Adelman & Chadwick, 2014) . We should always disconnect the
net after use, thus restrict unauthorized access. It is preferred to use any sort of website with https
for safety. As the city is going to live over internet, they will prefer to do task on internet as
much as possible. Therefore it can be concluded , that wifi free nation will profit the country but
will cause threat at some points for the citizen.
Q3 Security ensured by using digital identity
Digital identity is information on an individual used by computer systems to represent an
peripheral agent. Digital identity involves a third party to verify and assess the authenticity of an
individual. This is an intersection of technology and identity (Baym, 2015). The unique factor of
digital identity is that they are something permanent facts. According to me, the role of digital
identity is increasingly awareness for policy consultation across different places throughout the
world. Number of governments are implementing and suggesting national digital identity
schemes , and they aims of providing unique identity for every citizen of particular nation , so
that the data produced are précised and accurate. According to my perception, utilization of
digital identity will successfully help me to preserve my privacy, during the time I am using my
personal devices (Potts, 2014).Not only people but I believe that it is necessary for every
organization to make an unique identity declaration for marketable enterprises such as online
banking, e-Commerce, and trading. It helps to maintain our individuality and maintains the
identity of the country in a protected way from identity theft and other criminal activity over
internet is a problem for citizens, enterprises and government as emotional, financial and
Document Page
5CLOUD SECURITY AND SERVICES
practical costs are at stake and rising every year. It is easy to exploit digital identities and is
highly commercial; the other significance of digital identity includes the helping ability of digital
identity in businesses to understand their customers well without interacting with them and long
lasting relationships can be established (De Gante, Aslan, & Matrawy, 2014). Digital identity
also helps in attracting customers and helps them to retain the customers, allows delivering new
values and growth level. The elementary significance to one’s digital identity is trust. My
believe says that, the utilization of digital identity is helpful in respect of tracking information
and revelation of personal data. To prove the identity of a person, everyone needs to show their
legalized documents, this include license, ID cards or any document that has been approved by
the government of that country. These documents are those on which we can rely completely
without doubt to verify the identity of a citizen.
Q4. Security and Privacy of Digital Identity:
In this type of network it is very essential to protect the privacy and security of our digital
identity. The hackers can access bank account by the stealing the digital identity information. To
ensure the safety of the digital identity peoples must concern about the usage of their mobile
phones as the digital identity can be accessed through their phones (Mikhaylov et al.,2013).
According to me there is some steps that I could follow to ensure my safety in this network
environment. The steps are discussed below.
1. Avoiding unprotected and public network:
The public or unprotected network does not use any protection over it, which is creating a
major loophole in the network system. It means that proving any type of sensitive information
over this type of network while using my mobile phone can give the hacker a chance to hack into
Document Page
6CLOUD SECURITY AND SERVICES
my system (Jin, Gubbi, Marusic & Palaniswami, 2014). That means I need to ensure that while
using this type of network I must not share ant sensitive data over it. Advantage of using the
public Wi-Fi that I can ensure my security while my mobile phone but the main disadvantage is
that I will be unable to use the free Wi-Fi services.
2. Avoiding unprotected webpages:
Browsing through unprotected network can lead to lose of the digital identity
information. The unprotected web pages start with “http” and the protected web pages starts with
“https” which stands for “Hyper Text Transfer Protocol Secure”. I should only browse the
“https” websites to ensure my digital identity security. Advantage of avoiding the unprotected
website is that our mobile protected from visiting the fake websites. In many cases the
unprotected websites hold genuine data that I cannot visit due to the protection which is a
disadvantage of it.
3. Changing passwords frequently:
Password is the main barrier between the hacker and digital identity. That means
everyone should cautious about their passwords. I can create a secure password for my mobile
and my social media accounts by using mixed type of alphabets, numbers and special characters
and by changing them frequently (Ion, Reeder & Consolvo, 2015). Changing the passwords
frequently create difficulties for the hacker to crack passwords which is a big advantage but
frequent changes also lead to forgetting the passwords and create confusion between old and new
passwords.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
7CLOUD SECURITY AND SERVICES
4. Regular software updates:
Software update on regular basis can protect the digital identity from external attacks.
The operating system developers identifies the potential external threats and provides a security
patch update which patches the existing system and create it more secure than before(Mellmer et
al., 2014). I should always check my electronics devices including the computer and mobile
phone is up-to-date or not. Whenever any software update available for my phone, I must install
it immediately (Ilyas, & Mahgoub, 2016). This update not only refers to the operating system
but also includes the browser and applications install in my phone. Main advantage of updated
software is that it is able to protect the device from the latest type of attacks. An example is the
ransomware attack. Often, the developers providesfaulty update which leads to many bugs in our
system, it is a big disadvantage of software updates.
Document Page
8CLOUD SECURITY AND SERVICES
Reference
Adelman, W., & Chadwick, M. (2014). U.S. Patent No. 8,904,040. Washington, DC: U.S. Patent
and Trademark Office.
Baym, N. K. (2015). Personal connections in the digital age. John Wiley & Sons. Personal
connections in the digital age. John Wiley & Sons.
Budde, M., Köpke, M., Berning, M., Riedel, T., &Beigl, M. (2013, September). Using a 2DST
waveguide for usable, physically constrained out-of-band Wi-Fi authentication.
In Proceedings of the 2013 ACM international joint conference on Pervasive and
ubiquitous computing (pp. 221-224). ACM.
Cheng, N., Wang, X. O., Cheng, W., Mohapatra, P., &Seneviratne, A. (2013, April).
Characterizing privacy leakage of public wifi networks for users on travel. In INFOCOM,
2013 Proceedings IEEE (pp. 2769-2777). IEEE.
Css.edu. (2018). Catholic Benedictine College | The College of St. Scholastica. [online]
Available at: http://www.css.edu/about.html [Accessed 25 Jul. 2018].
De Gante, A., Aslan, M., &Matrawy, A. (2014, June). Smart wireless sensor network
management based on software-defined networking. In Communications (QBSC), 2014
27th Biennial Symposium on (pp. 71-75). IEEE.
Grassi, P. A., Garcia, M. E., & Fenton, J. L. (2017). Digital identity guidelines. NIST Special
Publication, 800, 63-3.
Ilyas, M., &Mahgoub, I. (2016). Smart Dust: Sensor network applications, architecture and
design. CRC press.
Ion, I., Reeder, R., &Consolvo, S. (2015, July). "... No one Can Hack My Mind": Comparing
Expert and Non-Expert Security Practices. In SOUPS (Vol. 15, pp. 1-20).
Document Page
9CLOUD SECURITY AND SERVICES
Jin, J., Gubbi, J., Marusic, S., &Palaniswami, M. (2014). An information framework for creating
a smart city through internet of things. IEEE Internet of Things journal, 1(2), 112-121.
Magno, M., Polonelli, T., Benini, L., &Popovici, E. (2015). A low cost, highly scalable wireless
sensor network solution to achieve smart LED light control for green buildings. IEEE
Sensors Journal, 15(5), 2963-2973.
Mellmer, J. A., Young, R. T., Perkins, A. D., Robertson, J. M., Sabin, J. N., Mcdonald, M. C., ...
& Carter, S. R. (2014). U.S. Patent No. 8,631,038. Washington, DC: U.S. Patent and
Trademark Office.
Mikhaylov, D., Zhukov, I., Starikovskiy, A., Kharkov, S., Tolstaya, A., &Zuykov, A. (2013,
November). Review of malicious mobile applications, phone bugs and other cyber threats
to mobile devices. In Broadband Network & Multimedia Technology (IC-BNMT), 2013
5th IEEE International Conference on (pp. 302-305). IEEE.
Mu, J., Cui, A., & Rao, J. (2013, July). Android mobile security–threats and protection.
In Proceedings of international conference on computer, networks and communication
engineering (ICCNCE 2013) (pp. 23-24).
Potts, J. (2014). Economics of public WiFi. Australian Journal of Telecommunications and the
Digital Economy, 2(1).
Ransing, R. S., & Rajput, M. (2015, January). Smart home for elderly care, based on wireless
sensor network. In Nascent Technologies in the Engineering Field (ICNTE), 2015
International Conference on (pp. 1-5). IEEE.
1 out of 10
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]