1. In every sector like finance, banking, marketing are using technological applications to make their works easier. The technological applications mainly include storing the data online which can be accessed from anywhere and anytime and also reduces the paper work. In order to reduce the accidents and casualties on the road and highways technological help should be taken in managing the traffic. The smart sensors need to be installed at traffic signals having real time analysis. Cisco had come up with idea known as Smart traffic management with real time analysis which will help in mange the traffic. According to the financial times the no of cars has surpassed over 1.3 billion, it is implacable that out of every seven person two of them own cars. It has become easy for a common man to afford a car for comfortable lifestyle which has increased the road congestion and traffic pile up. In order to manage the movement of all the billion vehicles smart traffic management has to be implemented.
Implications for privacy of the Singapore Government’s Smart Sensor Network
To implement the smart sensor network every individuals data such as his name, birth, address, vehicle registration number has to be stored online in the cloud to access his information when he break the traffic rules. In order to manage the data of over a billion people it is the huge challenge for them to protect and manage the data. Moreover the government releases these data which is available to the wider population. As the result it raises issues about who has legal access, which section of the data is for public usage and which is not. What can be the appropriate privacy framework to link the data?
Visitor to Singapore
If I was a tourist who is visiting Singapore then firstly I don’t own any car so I don’t have to worry about the sensors in traffic signals but it will be helpful if the sensors are installed in the bus stops as it will help me to know the bus routes and their arrival timing thus will prevent me getting lost in the huge country. Secondly I would be extra cautious while littering packets and bottles around the places as there are cameras an sensors which can catch me red handed spreading dirt around the place thus these are the two advantages I would get as a tourist
Resident of a Singapore
Being the resident of Singapore I can buy the car in this city thus the installed sensors in traffic will restrict me to be in my speed limit thus accident can be avoided moreover due to sensors there will be better management of the traffic. I can also get the information about the status of traffic in various places. All the data of the residents are stored online in the cloud despite of all the advantage I would also be worried about the leakage of the data online as I am aware of various cloud data leakage I the world.
2. Visitor to Singapore
If the Singapore Government under the Smart Nation Plan deploys a series of sensor boxes to act as WiFi hotspots throughout the city then as a tourist of the Singapore it would be easier for me to access the internet which will be give various advantage firstly if I have to book a cab I can easily book the cab through the app. Secondly if I get lost in the city I can easily access the Google map to get my location. Thirdly I can use the internet to find the best hotels and restaurants. Thus having easy access to internet will enable to be independent and not depend on the tourist guide for any query.
As a resident of Singapore
Being the resident of the Singapore it would be useful in emergency situations such as earthquakes, where a free Wi-Fi can be beneficial to connect with other people when the telecom line goes down. If I have a limited network access then I can use the public wifi for long hours to watch videos, download huge files, access e books. With a huge number of people using public Wi-Fi it would result in slow down the data speed or can limit the data usage in the devices. Sharing private data over the public wifi would eventually be at risk as they are easily subjected to the cyber crimes. Even if the precaution is taken to secure the public Wi-Fi, hackers still can create a hotspot which is fake with the help of the software called wifi pineapple which is a portable router device making the unsuspected users to be easy targets to cyber crime?
Having sensitive information in the mobile which need to be shared
As discusses above the public wifi can only be used for entertainment but it cannot be used for sharing sensitive information, because the public wifi are easily vulnerable to cyber attack. If I do not have a strong firewall against the public wifi there could be the leakage of the passwords & the bank account numbers over the network and any confidential folders on the device are vulnerable for the others to see .When I use a public Wi-Fi network , I have to know that I am not alone who is using the internet , With other users also operating the internet, the bandwidth of the network is distributed among the users , as the result my device will operate slowly , Some users could be using the network to spread viruses and it can not only cause lag but put my device at serious and permanent risk .
3. Singapore's Smart Nation initiative was officially launched by Prime Minister Lee Hsien Loong on 24 November 2014.The smart nation is implemented in five domains which will be significant for the citizens and society where digital technology will play crucial rule these are:
- Home & environment
- Home & environment
- Business productivity
- Public sector services
The security of the smart nation is the huge challenge for the Singapore therefore the national cyber security of Singapore aims to make the smart nation safe. The important key to the Singapore Smart nation dream is the Big Data and Internet of Things. According to me the big data is the major application for the vision of the smart nation but it is the huge challenge for the government to protect the data. Though cyber security of Singapore said that they are building a resilient network to protect the data of the people but it is the still huge challenge for the government to protect the data as hackers are searching different methods to hack the data. As per my research the digital identity can be assisted to maintain my privacy while using the mobile phone or devices in my visit to the Singapore as the government are taking various steps to protect the data. Firstly SA chief David Koh briefed in the media that they have prepared national master plans on cyber security from 2013 to 2018, he has divided the security into four pillars
The first pillar is to set up the protection of the government online services such as e-Government sectors like finance, transport and healthcare and different utilities according to the Cyber Security Agency of Singapore (CSA). The second pillar is to provide the IT professionals. In the third pillar is to establish a professional workforce for the cyber security sector and this includes creating clearer pathways for existing professionals. As for ensuring a good talent pool, CSA is working with various Institutes. The fourth pillar is to establish a stronger ties with its counterpart nation related to stopping the cyber crime and to stop them which crossed the national boundaries. Therefore the designed four pillars by the government is enough insurance for me to share confidential data using the digital assistance of Singapore. Moreover there has not been any news relating to the data breaches of the smart nation plan. Thus according to me the four pillars are strong enough to prevent the breaches of data.
4. Though the four pillars are strong enough to prevent any reaches but I have to take same step in order to protect my data. Various ways are listed to protect the data:
Encryption is the process of conversion of data tired in electronic data base into another form, which is known as cipher text. The cipher text cannot be easily understood by anyone except the authorized person. The encryption algorithms play a important role in the security assurance of IT systems and communications as they can provide not only confidentiality, but also the
Key element like Authentication, Integrity, non repudiation. The advantage of using the encryption is that it will make difficult for the hackers to decode the text but the disadvantage is that if the owner of the data forgets the password that it will even difficult for the owner to decrypt the file.
The cloud services (Drop box, cloud, Ever note, etc) is the best technology to keep the huge amount of data which can be accessed from anywhere and anytime storing the data in the cloud will protect the data from any breaches and reputed organizations like Amazon web services are working in these field. Although the data is managed by some reputed organization but there is still the chance of data breach making the data potentially accessible by others. Therefore the data entrusted to them is I will make sure it's encrypted.
To provide the data extra security from my side I will generate a stronger password every time. To remember and creating the password I will use a password-management app like Last Pass or 1Password and if a service offers multi-factor authentication, then I can surely make use of it.
Back up early and often
The most important step in protecting my data from loss is that I need to back it up regularly or else I will lose the data if my system crashes completely. There is also third-party which offers backup programs through more sophisticated options. Whatever program is used, it's important that I store a copy of the backup in case of fire, tornado, or other natural disaster that can destroy your backup tapes or discs along with the original data. although I can use the backup to protect my data but the as everything is backed up all at once it takes longer than other forms of backup. Another disadvantage is the security issue, since everything is stored in once place an entire copy of the data could be stolen.
Use rights management to retain control if data is stolen
If I need to send data to others but I am worried about protecting, I can use Windows Rights Management Services (RMS) to control what the recipients are able to do with it. For instance, I can set rights for the recipient that how much he can read the Word document I sent but can't change the document or copy it or save the document. I can also prevent recipients from forwarding e-mail messages I have send them and can even set documents or messages to expire on a certain date/time so that the recipient can no longer access them after that time. To use RMS, I need a Windows Server 2003 server configured as an RMS server. Users who are assigned rights also need to download a certificate from the RMS server.
Therefore from the given ways of protection of data I conclude that these steps can be used to provide extra security to the data from my side even after using the organization services to protect the data.