Describe a threat model against phone hacking.

B1 Threat Modelling, no less than 900 words
Describe a threat model against phone hacking.

B3 Surveillance, no less than 600 words
The following is an extract from a book written by one of the worlds foremost security experts:
Your cell phone tracks where you live and where you work. It tracks where you like to spend your weekends and evenings. It tracks how often you go to church (and which church), how much time you spend in a bar, and whether you speed when you drive. It tracks since it knows about all the other phones in your area whom you spend your days with, whom you meet for lunch, and whom you sleep with. The accumulated data can probably paint a better picture of how you spend your time than you can, because it doesnt have to rely on human memory. In 2012, researchers were able to use this data to predict where people would be 24 hours later, to within 20 metres.
Bruce Schneier, Data and Goliath (The Hidden Battles to Collect Your Data and Control Your World), published by W.W. Norton & Company, 2015.
Discuss what you consider to be the greatest benefit and greatest drawback of this form of surveillance.

Are you looking for a similar paper or any other quality academic essay? Then look no further. Our research paper writing service is what you require. Our team of experienced writers is on standby to deliver to you an original paper as per your specified instructions with zero plagiarism guaranteed. This is the perfect way you can prepare your own unique academic paper and score the grades you deserve.

Use the order calculator below and get started! Contact our live support team for any assistance or inquiry.