Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Please In YOUR own word NO copy and pasting. IF copy and paste, include citation

ID: 3701300 • Letter: P

Question

Please In YOUR own word NO copy and pasting. IF copy and paste, include citation! Must type work. NO handwritten or photo. will NOT give thumbs up if otherwise. thank you

1. Bruce Schneier says one should consider the following things when considering implementing a security system:

What assets are you trying to protect?

What are the risks to those assets?

How well does the proposed solution mitigate those risks?

What other risks might the proposed solution cause?

What are the costs and trade-offs of the proposed solution?

Assume your cousin lives with a spouse, a pre-teen daughter, and a teenage son. Your cousin has asked for advice on whether to install a monitored burglar alarm in their home. What advice do you give? You do not have to find out the cost of burglar alarm systems for this assignment, but address all the rest of Schneier's considerations.

Explanation / Answer

Answer is as follows:

Let us suppose the example of Terrosrist Information Awareness(TIA):

In 2002, the U.S. government embarked on an experimental data mining program designed to sweep through large swaths of data looking for suspicious things that indicated terrorist activity. This predictive counter-measure is called Terrorist Information Awareness . So the Answer of given queries are as folllows:

1) What assets are you trying to protect:

2) What are the risks to those assests:

Terrorism: It's hard to be more specific in this case, because the TIA database proposal is more a response to terrorism fear than a response to a specific threat.

3) How well does the proposed solution mitigate to protect:

Predictive data mining systems are largely ineffective. There are two problems:

4) What are other risks :

The databases themselves would become prime targets for criminals, both outsiders wanting to break into the system and steal the data and insiders already trusted with the data. Common criminals are far more numerous than terrorists, and the most secure solution is to not aggregate this data in the first place.

5) What are the costs and trade offs :

The monetary cost for these sorts of systems would be astronomical. It's not the algorithms that purify through the data looking for patterns that would cost so much but getting the data in the first place. The systems that need to provide input into the data mine are many and varied, and largely incompatible with each other.

TIA is not worth it. It doesn't even come close. Someday artificial intelligence might reach a point where these kinds of systems might be considered, but we're nowhere near there yet. Implementing a system like this would force us to make enormous trade-offs in return for minimal additional security.

Some have defended this program as being necessary for evidence collection after a terrorist attack. That argument makes even less sense; the police already know how to collect evidence from diverse sources, and they demonstrated how effective they can be in the days and weeks following 9/11. Giving them a less effective and much more expensive way of doing what they already do well is simply a bad trade-off

if there is any query please ask in comments.....