For this project I created an instructional manual for creating an Ad-blocking DNS server.
Author: Jeremy C.
Jeremy Coronaâs Expanded Definition of Cryptography
Jeremy Coronaâs Expanded Definition of Cryptography
TO: Prof. Jason Ellis
FROM: Jeremy Corona
DATE: 10/15/2019
SUBJECT: Expanded Definition of Cryptography
Introduction
Definitions of words over the course of time can change. Depending on their time period the word can mean one thing, and in the next 10 years itâs meaning could be completely different. In all depends on the context in how the word is used and what is being used to describe. Take a look at the word cryptography for instance. In the earlier days it means to write in secret writing, now in the digital age cryptography is similar to encryption. We will dive a into the etymology of the word  and see how it is used in different contexts. We take examples from different works of literature ranging from blogs to academic journals.
Definitions
According to Etymonline.com, the word cryptography comes from the Greek words kryptos which means hidden, and the word graphia which means writing or recording. Their definition of the word cryptography is âart of the writing in secret charactersâ (Etymonline.com, 2019). This holds true to the origin of the words. This definition is an older meaning of the word. Back in the earlier days people were handwriting letters in secret letters or codes which was a form of cryptography.
Cryptography can also be used as a kind of technology. âCryptography is the process of changing data so that they are not readable â(Rashad et al, pg. 3681, 2019). This definition is given by an academic research paper and different from Etymonline. Instead of writing in secret codes, we are translating data that is legible by an ordinary person and changing it so that it canât be. This definition is a more technical and is referring to data as opposed to writing. However, the core definition remains the same. At the core of cryptography, we are gathering recorded information and making it difficult to interpret.
The Oxford English Dictionary gives the following definition for Cryptography: âThe art or practice of writing in code or cipher; the science of encryption; the branch of cryptology concerned with this (cf. cryptanalysis n.). More generally: the study of codes and ciphers; cryptology.â (Cryptography, 2019). This definition introduces another aspect of cryptography which is encryption. From a technical perspective encryption is a part of cryptography. When something is encrypted the purpose is to prevent unauthorized access to information. The other meanings of cryptography reflect that as well. We are trying to protect or hide information from others who are not meant to see it.
Context
Keeping those definitions in mind we can take a look at some of the contexts in how the word cryptography is used. Letâs take at look at its use in a magazine article on qauntamagazine.org. âNow a set of computer scientist has taken a major step toward this goal with the release of EverCrypt, a set of digital cryptography tools.â The author is using the word as a type of technologic tool in the digital age. The entire article is about new un-hackable tools created by computer scientist and mathematicians. In this context cryptography is being used as a way to protect data from being accessed by hackers with malicious intent.
In blog post by Mathew Green on his website blog.cryptohtaphyengineering.com, we can see similar usage of the word. This blog post is about Apple and their new tracking technology implemented in their app âFind Myâ. The quote from the post: âThe good news is that Apple claims that their system actually does provide strong privacy, and that it accomplishes this using clever cryptographyâ. Again, we see cryptography being used in the context of protecting some kind of information. In this case Apple is utilizing unique cryptic codes to protect the data of their users from getting into the wrong hands. Cryptographic algorithms are developed in order to make data private.
According to Soltane, Messikh, and Zaoui (2018), âIts deep questions with practical significance; that Cryptography, which allows us to maintain secrecy in messages containing sensitive information, is based on requiring anyone other than an authorized person to perform a very difficult computation in order to steal the information.â Here we see the same pattern where cryptography is being defines as keeping information secret. The purpose of cryptography is to make it extremely difficult for unauthorized personnel to access data. The article combines cryptography with biometrics. In this example we are not creating cipher or code for cryptography. We are instead using our own biological data to act as a cipher or cryptography. We utilize the use of our fingerprints or facial features in order to prevent the unauthorized access to our private information.
Working Definition
Based on these definitions and contexts discussed. We can conclude that core definition of the word cryptography is based on security of recorded information. My working definition of the word cryptography is, the practical application of concealing information from unauthorized personnel. This definition works perfectly for the field of Network Security. A network security analystâs duty is to protect an organizations internal network from data breaches and leaks. They must also be able to ensure that any digital communication outside of the organizationâs network is encrypted and concealed only to be seen by the intended personnel. In Information Technology, this is an aspect of the field that is highly emphasized. From big organizations to individuals with smartphones, we want to be able to keep some information private. Using cryptography tools allows us to accomplish security and peace of mind.
References
Soltane, M., Messikh, L., Zaoui, A. (2018), A review regarding the biometrics cryptography challenging design and strategies. Broad Research in Artificial Intelligence and Neuroscience. 8(4), 41-65.
Rasras, R.J., Alqadi, Z.A., Sara, M.R.A. (2019). A methodology based on steganography and cryptography to protect highly secure messges. Engineering, Technoogly & Applied Science Research. 9(1), 3681-3684.
Green M. (2019). How does Apple (privately) find your offline devices. Retrieved from https:// https://blog.cryptographyengineering.com/
Hartnett K. (2019). Cryptography that canât be hacked. Retrieved from https:// https://www.quantamagazine.org/how-the-evercrypt-library-creates-hacker-proof-cryptography-20190402/
Cryptography, n. (2019). In Oxford English Dictionary Online. Retrieved from https://oed-com /view/Entry/45374?redirectedFrom=cryptography#eid
Cryptography, n. (2019). In Etymonline.com. Retrieved from https://www.etymonline.com/word/cryptography#etymonline_v_29120
Jeremy Corona’s 500 word Article Summary
TO: Prof. Jason W. Ellis
FROM: Jeremy Corona
DATE: 09/17/2019
SUBJECT: 500-Word Summary of Wiedemannâs âResearch for Practice: The DevOps Phenomenonâ
If you are in the realm of Information Technology, then you most likely have heard of the term âDevOpsâ. DevOps stands for Development Operations. A lot of people even IT professionals have a hard time defining this term. Is it a career? Is it a concept? What is a DevOps Engineer? DevOps is all of those and more, it is best to think of it as a culture. DevOps is a method of software development and delivery. It is method organizations are taking advantage of in order to improve the efficiency of their software development, deployment pipeline. In this article âResearch for Practice: The DevOps Phenomenonâ by Wiedemann, Forsgren et al. takes a closer look at this new methodology on producing stable, feature rich software applications with high customer satisfaction.
The traditional âWaterfallâ method of delivering a software product has been around for years. While it does have its advantages there is a giant gap between the software developers and the operations team. DevOps is the methodology to bridge that gap. During the Waterfall method once the project is done, the application is handed off to the Operations team. They are responsible for the day to day maintenance and stability of the application. They are on the forefront when interacting with customers and bugs are being found. Developers do not usually see this going on in the background because as far their concerned they have delivered the product. This can cause a conflict within the two teams because when the new features roll out, the operations team is worried about more instability and bugs.
With the DevOps methodology, organizations bring those two teams together to develop and produce software that continuously creates value. There are many ways to implement this concept. Collaboration is key. Operations people will start doing some development work to see how things get done and how the teamsâ function. Developers would start maintaining some of the products that have created as well. Some organizations implement cross training and job shadowing. This puts employees on the same page when brainstorming new products or developing and delivering new meaningful features to an existing product. âFor organizations hoping to capture market share and deliver value faster (or even just deliver software more safely and securely), DevOps promises both speed and stability.â (Forsgren, 2018, p. 45.)
This doesnât mean that DevOps is easy to implement in an organization. Organizations may be hesitant to change their software development cycle. Implementing DevOps may cause some employees to gain more responsibility, and that can always be alarming. Strong leader-ship is needed to adopt this mind set. DevOps isnât a strict structure. It is a very flexible concept that organizations implement in their own ways. DevOps teams doesnât just only have to include developers and operations members, some organizations include stakeholders as well. The goal is for the organization to not fall short in deploying fast, high quality software products.
DevOps has many different definitions to different organizations. To some itâs a position to bridge the gap between two teams, to others it is a collaborative team with one common goal. DevOps It is a guideline, and a set of principles for organizations to follow. Organizations across the globe are having great success with this methodology. Implementing DevOps can be challenging, but with strong leadership and inclining employeesâ organizations can reap the benefits of DevOps.
References:
Wiedemann A., Forsgren N., Wiesche M., Gewald H. & Krcmar H. (2019).Research for Practice: The DevOps Phenomenon. Communications Of The ACM, 62(8), 44-49.