Week 3, Weekly Writing Assignment

As discussed in the Week 3 lecture posted below, I discuss in detail the parameters of this week’s writing assignment and how it supports your overall success on the first major project: the 500-Word Summary. Please review the lecture carefully and make notes in your notebook. One of the nice things about taking notes from a video is that you can pause it while you are writing!

Here is an outline of what you need to accomplish for this week’s writing assignment:

  • Create a first draft of your 500-Word Summary
    • Turn your reverse outline memo into a first draft by removing the paragraph numbers and chunking your sentences into one long paragraph or several smaller paragraphs. The summaries that you wrote of each paragraph in the article allows you to quickly create a draft summary of the entire article. You will likely need to read over it and add language to create a flow from each sentence to the next, or each paragraph (of yours) to the next.
    • Add a sentence below the memo header and above your summary that states the purpose of the memo. For example: This memo is a 500-word summary of the article, “Write Title of Article,” by Some Author, a researcher at IBM (look in the article or online for information about the author that you can add to contextualize them). If you have multiple authors, you might have to leave off this information unless there is a common workplace. Another option is to include their affiliation in parenthesis after each name.
    • Find one sentence or phrase in the article to quote and cite in the body of your summary. Use APA style for the in-text citation (see third paragraph here).
    • Edit the draft as much as possible to hit the 475 < 500 < 525 window for your 500-word summary. Since this is a draft, it is okay if it is shorter or longer than the window, but more work that you do now on your writing will save you work later.
  • Conduct peer-review of your writing with a small team of students.
    • On Wednesday, Sept. 9 in the afternoon, I will begin sending emails to randomly assigned small teams of students. These will arrive in your official City Tech email account, so watch for them.
    • After you have completed your first draft (please do so as quickly as possible), click on “Reply All” (as shown in the lecture video) to the email that I sent you. This will send your email to Prof. Ellis and your teammates. Write a brief email thanking your team in advance for giving you feedback. Copy-and-paste your draft summary memo into the email below your message and then click send.
    • As you receive emails from your teammates, read their summaries and then click “Reply All” and include the following in your email: Salutation to the author of the summary you are responding to, a sentence or two about what you think works in their summary, a sentence or two about what needs correcting (and give advice about how to correct, perhaps one example), and whether their APA cited quote in the body of their summary and bibliographic reference at the bottom of the memo look correct (refer to the Purdue OWL APA pages here and here. Then, click send.
    • Collect the feedback that your 500-word summary receives as you will need this next week when you revise your 500-word summary for the final draft and for the weekly writing assignment.
  • Pro Tips
    • Remember to create versions of each document that you write in our class. For example, open your reverse outline memo in your word processor and choose “Save As” and save it with a new file name, such as “500-word summary draft 1.” Next week, you can do this to the “draft 1” file and save it as “draft 2” or “final draft.”
    • Before sending your emails, double check that you have chosen to “Reply All” so that your teammates and I will receive your responses.

1 thought on “Week 3, Weekly Writing Assignment”

  1. TO: Professor Jason Ellis

    FROM: Nargis Anny

    DATE: September 9, 2020

    SUBJECT: 500-word summary reverse outline

    This is a 500 word summary of “A Smart Agent design for Cyber Security based on HoneyPot and Machine Learning”. The article highlights the rise of security risks that come with the rise of social media and the World Wide Web. We’re also introduced to the programs that keep the security programs running, as well as the setbacks it’s brings to computer systems worldwide.

    In the article, GDATA states how every year there are over millions of Cyber attacks that have been discovered. These issues are often involves analysis tools that keep track information. However, the difficulty is keeping an eye on every problem that arises. With a better understanding of how Cyber attacks work, there’s a better chance of preventing future issues. HoneyPots is one of the most prominent cyber security programs to date. Developed in 1992, HoneyPots is utilized as a monitoring and detecting system that locates harmful malware. Now future attacks can be prevented before they even find a system to disrupt. Part Two talks about Anomilies, data which has to be protected from harmful versions of software. With Social Media sites such as Myspace or Facebook, these sites need to be observed in order for a social ‘Honeypot”, to detect harmful profiles, as well as any other threats out there. Authors suggest a linkage defense system, which can bypass the setbacks brought on by past tools that tried to work. The Linkage system has the Honeypot’s and the defense system coexist together by having their management and communication tools work together. This system is based on a SMNP model code used in network management. Now Future intruders will be blocked by firewalls, if they try to hack into the system. Machine Learning is where we learn that computers operate under the system program that it’s been assigned. The concept of “Machine Learning”, keeps the computers adjusted to data structure and how to operate properly. Machine Learning has training models that separate into two phases in order to function. The first phase is estimating the data through training, by demonstrating tasks like recognizing animals in images or speech translation. The second phase is production. Here we see new data pass through the system in order to get the computer to complete an objective. The K-Means algorithm helps maintain clustering from certain systems. Eddabbah indicates that the “K –Algorithim is a faster solution to the issue it still has major setbacks” (Eddabbah, 2020, Page 3). The Decision tree helps branch out all data structures in case of testing. Part 4 jumps back into HoneyPot, this explains the different security communication networks. The first part is HoneyPot deployment which can monitor either Internal or External attacks on the system. With this we can see attacks that are carried out or attempted on any network. With DMZ’s (Demilitarized zones), HoneyPot function as a way to provide public internet service away from the computer’s internal network. Next, we have networks like KFSensor, Netfacade, Specter and CurrPorts. KFSensor is a server that watches out for connections with the network. Netfacade allows numerous network hosts interactions through unused IP a dresses. Networks also have to direct security threats to the firewall and eventually the honeypot will separate it to see if it’s serious or not. To conclude, network security is a very serious problem due to constant evolving and threats are hard to manage. However, this manual offers are real life solution to this issue and they are looking to actually test it out within a real network setting.

    References:

    Kamel, N / Eddabbah, M / Lmoumen, Y/ Touahni, R “A Smart Agent Design for Cyber Security Based on Honeypot and Machine Learning”, Security & Communication Networks, (2020) ID 8865474 (9 Pages), 2020

Leave a Reply