Information Security and Privacy Report: Smart Sensor & WiFi Networks

Verified

Added on  2023/06/09

|18
|4715
|464
Report
AI Summary
This report examines the implications of government-proposed smart sensor and WiFi networks on information security and privacy within a smart city framework. It analyzes the impact of these networks on citizens, including expected behavioral changes, shifts in time schedules, and choices of activities. The report further explores the implications of sharing sensitive information on mobile devices within these networks. It also discusses the use of digital identity to maintain privacy and outlines essential steps to ensure security and privacy. The analysis considers how these technologies affect different categories of people and their interactions with the urban environment, emphasizing the importance of balancing technological advancements with the protection of personal information and individual freedoms. The report draws on various sources to support its findings and recommendations.
Document Page
Running head: INFORMATION SECURITY AND PRIVACY
Information Security and Privacy
Name of student
Name of University
Author’s Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1INFORMATION SECURITY AND PRIVACY
Table of Contents
1. Proposed Government’s Smart Sensor Network......................................................................2
a) Types or categories of people affected.................................................................................2
b) Expected behavioural changes from normal citizens........................................................3
c) Expected change in time schedules, choice of activities of an individual behaviour...........3
2. Proposed Government’s Smart WiFi Network........................................................................4
a) Types or categories of people affected.................................................................................4
b) Expected behavioural changes with the use of mobile devices in CBD from normal
citizens.........................................................................................................................................5
c) Expected change in time schedules, choice of activities and more of an individual
behaviour.....................................................................................................................................6
d) Implications for sharing sensitive information on a mobile device..................................8
3. Use of Digital Identity to maintain privacy using mobile phone or devices............................9
4. Steps to ensure security and privacy of digital identity..........................................................12
5. References..............................................................................................................................14
Document Page
2INFORMATION SECURITY AND PRIVACY
1. Proposed Government’s Smart Sensor Network
The Australian State Government has decided to implement the Smart State Plan for their
State by reviewing the Singapore Government’s Smart Nation Plan. The Smart State Plan
consists of the following features in their CBD, and with this, it will monitor the behaviour of the
citizen and address the crime of the street.
a) Types or categories of people affected
People Affected
The categories of people who have no
concern about the environment
They affected the environment by throwing
the garbage anywhere on the street
The categories of people who do not follow
the traffic rules and keep the reckless attitude
Breaking the traffic signal and randomly
crossing the road. Follow the signal of the
traffic; permitted speed is marinating at the
traffic
The categories of people committing crime at
the public place and bus stops
Performing some activities that are illegal
like robbing, killing, stealing and more.
The traffic police Law and order are followed at the traffic
Garbage agencies Managing the collection of garbage from the
public places
Document Page
3INFORMATION SECURITY AND PRIVACY
b) Expected behavioural changes from normal citizens
With the presence of the public camera, a subtle but profound change has been brought to
the character of the normal citizen. The authorities watched the citizens or make them aware as
they are less free-wheeling and more self-conscious. People had become more conscious at the
traffic light with the use of camera and smart sensor network. There were certain law and order
that were maintained at the traffic with constant monitoring about the thinking of the people
(McDonald, 2015). The number of people is getting increase who uses rubbish bean which is
kept at every public place. When something that is not happening naturally then there is a need
for establishing believe in cleanliness in the mind of the people to increase the monitoring level.
Before making any commitment, people have to think twice as it violates law and order was
everything can be caught by analyzing the footage of the camera. Moreover, people may get
worried about the feeling that they are constantly being monitored their concern may grow about
their privacy.
c) Expected change in time schedules, choice of activities of an individual behaviour
Following the cleanliness process:
As in many places, rubbish beans are being accustomed for garbage to get dispose of by
people. Presently, it may not come by natural, there may be some people who dislike such thing,
and however, by the end, the same thing will be followed which contribute to having a clean
environment.
Thinks should be organized:
A proper schedule of the time is to be followed by people and plan the terms in, an
organized manner and scheduling the travel for themselves. As this may help in avoiding heavy
traffic and breaking the rules of the ta traffic.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4INFORMATION SECURITY AND PRIVACY
Document Page
5INFORMATION SECURITY AND PRIVACY
Decease of the crime that is performed:
It is not easy to avoid the consequences of a crime that is committed by the people as
everybody knows it increases the monitoring level. Thus, people would not think of using the
places as a spot to do a crime which has targeted the most, and the amount is less for the security.
2. Proposed Government’s Smart WiFi Network
The Australian State Government has another the Smart State Plan to deploy a Network
with Smart Wifi. The Smart State Plan for the Smart Wifi Network has the following features in
their CBD where there is a Wifi hotspot for a series of sensor boxes throughout the city.
a) Types or categories of people affected
People Affected
The categories of people who are interested
in studying
Though the online medium getting access
to study material
The categories of people who are interested
in travelling
There is a hassle-free experience of
travelling
The categories of people who are getting
entertain online
To download, view and share content
online
The categories of people who dose their
business online
The business could be grown by attracting
people through online advertisement
The categories of people who are interested
in social engagement
Involvement of the self in getting in the
platform of social media
The categories of people could not manage
the activities of the household
To manage the activities of the household
like paying, bills, shopping for those who
Document Page
6INFORMATION SECURITY AND PRIVACY
have needs in the household
b) Expected behavioural changes with the use of mobile devices in CBD from normal
citizens
With the increase in technology, new activities associated with the people has affected
the behaviour. There is a dramatic change in the behaviour of the people. This is the internet age,
where various people get connected to the internet, however, still, some people do not have
access to the internet or in the other word if it is said, then the internet connection is limited for a
lot of people. Thus, a free internet connection when introducing to the people, then the impact
will be more on the people. The public Wi-Fi as providing free internet connection for the
people, the impact of it would be more on them. The Wi-Fi that is public provide an attraction to
the people having free connectivity (Bancroft & Scott Reid, 2017). Thus, it results in increasing
the online activities. Today, the internet is everywhere, as the digital world is embracing from the
love of the people. Through this changes being expected from the behaviour of the people,
instead of obtaining it offline, people would just prefer online activities. In such activities, people
would make the payment and purchase the product. However, they would prefer less to visit the
offline store to shop. For them, ordering online is much easier. Things would not require to be
organized by paying less as everything could be managed online. As such an approach of the
people does not blame the internet alone, it is related to the behavioural approach to which the
people are associated with. The new could be updated by the people across the world to make the
internet access easier (Hu et al., 2015). Overall, collective online activities are increasing among
the people. Those people who have difficulty communicating publicly find it easier to get
connected with the virtual social life. In this way, they will be more comfortable in
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7INFORMATION SECURITY AND PRIVACY
communicating, and sharing has become easier (Peddinti, Ross & Cappos, 2014). With this, it is
sure that the group of people have brought a lot of behaviour changes.
c) Expected change in time schedules, choice of activities and more of an individual
behaviour
Getting a free education:
Some people have got a lot of interest in studying. It is difficult for them to visit the
public library and get some book and then return them on time in which extra charges can be
avoided (Levin, Kark & Crandall, 2015). As the free WiFi is available which help to get the
online books downloaded easily and read them anytime from anywhere. There is no need of
returning the book online. Therefore, for people would prefer more to read online and might visit
less or hardly to the library as per their convenience.
Flexibility in working:
It is already seen that today technology has shaped the world. It influences the
communication that is taking place. There is no such necessity that employees who are doing
jobs need to be present in the office and do their assignment. Electronic communications such as
email, chat have become more effective (He, Chan & Guizani, 2015). There is a need for
seamless access that has to manage the life of the job more easily. Students and Professionals
make the use of the free internet to some extents as to check through the emails, reply to their
responsibilities that do not miss important message which matters most.
Digital Economy is Embrace:
The present world completely depends on the digital economy. Everywhere it is found
that the digital economy is rapidly growing. Most of the people go for cashless payment from the
option that is present online in the form of digital wallets as it is a hassle-free, and also it is much
Document Page
8INFORMATION SECURITY AND PRIVACY
easier to use and keep money safe and use them anytime from anywhere from mobile, tablet or
any other devices (Panetto et al., 2016). It is not much necessary to carry any card or cash, here
the only thing that is needed is the smartphone which has an internet connection in an active
mode. Thus, the free Wi-Fi access has increased the number of users who are opting all the
payment that is made through digital payment.
On go Entertainment:
Today, people find everything online for entertaining themselves. It is a really good thing
that precedence is taking place with a new form of entertainment. Everything is available online
from songs, plays, movies, tech and a lot more. Thus, the value of digital entertainment increases
with the use of free Wi-Fi (Najaftorkaman et al., 2015). The users would now prefer to download
songs, movies from the internet and likely to rent or buy offline. There is content that is essential
for renting or purchasing, have free versions, and are all available online. All age group people
are influenced were younger groups of participants expected to know more.
Getting the city Explore like never before:
There are greater benefits to free public to travel. The city is getting explore through a
huge number of travellers rather than getting guidance from someone else for those who are
complete strangers. There is no difficulty in finding the information about a place where there
are attractive places to book hotel and cabs within the best price that is given. It is easier to make
the travel experience through public and free Wi-Fi, and it has become much independent to
make the city comfortably explore.
Engagement to the Social affair:
In the shortest possible time, the number of people that increases will get easy access to
the internet so that that they can easily get connected with their friends from anywhere around
Document Page
9INFORMATION SECURITY AND PRIVACY
the world. The more the social engagement will make the people focus less on the world that is
there around them (Hu, Zhao & Jiang, 2013). Most people will be busy in updating their status,
sharing their picture with friends, updating the status, chatting and keeping followers which is
hard for the people to refrain from.
d) Implications for sharing sensitive information on a mobile device
There are certain steps recommended to make the sensitive information protective at the time
of using a mobile device at the place where there is public Wi-Fi:
In the hotspot of a public Wi-Fi, once any device is getting connected to the hotspot, it is
needed to check whether multiple hotspots have the same name or not. It is often hard to
identify or recognize how much legitimate the hotspots are, and thus it becomes
important that the hotspot is avoided to have it in the safer side were the sensitive
information could be easily protected into mobile devices.
At a time where VPN configuration is not there, it is important to make sure that internet
connection whenever made to the device through public WiFi, there is an encrypted
session. Thus, here it becomes necessary to use those sites that have the HTTPS instead
of HTTP in the URL.
Using the VPN, internet traffic is made secure. There is an active connection of VPN,
was the internet is surfed, and this will ensure that whether entire internet traffic is getting
transferred through a tunnel having encrypted and secure data. With this, the security also
increases.
It should avoid the use of file transfer protocol (FTP) for the transaction.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10INFORMATION SECURITY AND PRIVACY
3. Use of Digital Identity to maintain privacy using mobile phone or devices
Digital identity is the network identity which is adopted in cyberspace by mobile phone or
device user. Security and privacy are the key areas to focus for the digital identity management
when seen the online social networks that allow the people to maintain an online identity which
overlaps between the real world and the online context (Friedman & Wagoner, 2015). A person
uniquely describes Digital identity that describe a person. It often created identities that reflect a
specific aspect or ideal version. The data for digital identity uniquely describe a person and the
all the information are stored online. This will identify the organizations, individual presence or
the electronic devices which are mostly operated online. There are unique identifiers or the
certain patterns of the user that usually get generated through the system having the possible
interactions with the network (Holt & Malčić, 2015). There are some of the services that are
avail online for those users who share their personal information such as social networking,
shopping. This is added to the user devices or the individual digital identities. It has some
sensitive information, and digital data are contextual. The information stored online through
which the individual presence, electronic devices or the organization is identified to operate
online (Harrell & Lim, 2017). The patterns of the user or the unique identifiers presence are
generated along with the system interaction having all possible network. Personal information is
shared by users so that some service could be avail online through social networking, shopping,
that have used the devices or the individual with digital identities (Shrier, Wu & Pentland, 2016).
Sensitive information is often contextual for the digital data as the service provider collected the
data to authenticate the user online. The plan has been greatly assisted in rolling out in such a
way that privacy could be maintained where there are identities of the user that have not reveal
and allow them to access and take the benefits that the government provide through some mobile
Document Page
11INFORMATION SECURITY AND PRIVACY
and similar devices (Wong et al., 2014). In that case, it is not necessary for them to be present
physically at the work location like the online banking, taxing, digital mailboxes, myGov
services, state government services and lot more. That individual who carries their digital
identity could gain ease in which complications and worries can be avoided while carrying the
ID cards (Yu et al., 2017).
Some challenges occur with the use of digital identities. The user has authorized the
reason that is associated with the digital identities of the users that can put the privacy at risk.
The trends of digitization are found all over the world, and the major issue over there is the
protection of the data of the user that is maintain online (Shrier, Wu & Pentland, 2016). Thus,
this indicates that users’ data that are kept online are not safe. The step taken for using the
Digital Identity would make the data secure and maintain the privacy. Such issues can be
addressed through Digital Identity which would be effective for the online security of data:
Transaction volume has increased:
The demand of the online purchase increases which increases the volume of transaction.
As digital identity is important, it customizes the transaction (Grassi, Garcia & Fenton, 2017). It
is possible to make the authentication of the transaction possible with the digital identity for only
those who can perform the transaction. Therefore, it makes the process customized and organize
it.
Transaction complexity has increased:
The complexity is more with an additional volume of financial activities where there is
new technology that is very attractive and convenient (Ilia et al., 2015). The experience of the
consumer improves, and the process has become complex. The user has identified the
chevron_up_icon
1 out of 18
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]