Nargis Anny- Professor Jason Ellis- New York City College of Technology – ENG2575 OL70-10/13/2020 …Cyber Security Cyber Security is the process of protecting various technological programs, systems and networks from viruses and other digital issues. The viruses are often set up by anonymous people who are looking to gain user information, disrupt the hardware setup as well as delete data. Now as technology develops in today’s age, so do the viruses and the requests for safer online security. Cyber security started out in the 1970’s. Bob Thomas, a computer researcher associated with ARPANET (Advanced Research Project Agency Network), invented a program called “CREEPER”. The “CREEPER” program would start on a network and crossover from system to system. And it would leave a trace behind in the form of a message, “I’M THE CREEPER: CATCH ME IF YOU CAN”. The “CREEPER “eventually came to an end thanks to Ray Tomlinson. Tomlinson, who invented the email decided to evolve the CREEPER and create an equivalent program called the “REAPER”. This program managed to follow the CREEPER’s trail and delete it permanently, making the “REAPER” the first antivirus program to be created. Eventually, Thompson and Tomlinson’s creations led to various software and network companies to realize that there were numerous bugs in their systems that could be tampered with. This became more serious when organizations had computers and phone lines operating together to create networks of their own. And thus, anonymous people could gain access to their information. Spanning across from the 1980s to the 00’s, the internet began to experience more popularity around the world as technology began improving rapidly. Cyber hackers became more prevalent as computer viruses improved and couldn’t be monitored. Inventor Robert Morris created the “Morris Worm” in 1988, a program that multiplied beyond networks, foisted computer bugs and replicated it to indentify the spots in the system. However, while this worked it caused internet service to slow down and damage networks heavily. In the 1990’s, firewalls and anti-virus programs were used to help protect public user information. As we reached the 2000’s, we see more criminal hackers being taken down with longer jail time and heavier fines for their actions. However, now hackers were able to create virus programs that not only could hit users in cities, but people across various parts of the world.However, while Cybersecurtiy does help, there are some setbacks. Security software often slows down computers and their network. A lot of people who use it are bound to have their personal data exposed to tons of people, who can use it for any reason. Technology users have been introduced to numerous cyber security threats such as Malware, Ransomware, Phishing and Social Engineering. With Malware, this software can tamper with user files through various codes and damage to data and network systems. Ransomware also tampers with user files, but requests a payment to gain to get back those files. Phishing is known for having various scam emails be sent to users under the guise of a legitimate source and steal information (address, card information, phone number, login information) once someone opens it. Social engineering is when someone manages to gain user information in person and use it for their own purposes. An example of this can be shown with credit card scammers. These people are known to ask associated for their card information to buy various goods, such as clothes, jewelry, cars or even houses and instead that person’s information and money is stolen. Even with the millions of dollars that go towards new security programs, there will always be something out there that tops it. In today’s time, technology researchers are looking towards using methods that would identify online users tech patterns, and prevent the threats from getting to them in the first place. To conclude, Cyber Security is something that will progress over time, and so will the viruses that can harm it. Despite this being an unfortunate reality, the best thing to do is to always be on top of any computer virus that is created. That’s all we can do as tech users. As we see Cyber Security, increase, we can hope for a program that wipes out any virus instantly and keeps the computer functioning at 100 percent.


I. Margaret Rouse
What Is Cybersecurity? Everything You Need To Know
April 03, 2020

II. Dakota Murphey
A History of Information Security – IFSEC Global: Security and Fire News and Resources
June, 27, 2019
III. defined, explained, and explored
IV. What is Cyber Security?

TO: Professor Jason Ellis

FROM: Nargis Anny

DATE: September 22, 2020

SUBJECT: 500-word summary

This is a 500 word summary of “A Smart Agent design for Cyber Security based on HoneyPot and Machine Learning”. The article highlights the rise of security risks that come with the rise of social media and the World Wide Web. We’re also introduced to the programs that keep the security programs running, as well as the setbacks it’s brings to computer systems worldwide.

In the article, GDATA states how every year there are over millions of Cyber attacks that have been discovered. These issues are often involves analysis tools that keep track information. However, the difficulty is keeping an eye on every problem that arises. With a better understanding of how Cyber attacks work, there’s a better chance of preventing future issues. HoneyPots is one of the most prominent cyber security programs to date. Developed in 1992, HoneyPots is utilized as a monitoring and detecting system that locates harmful malware. Now future attacks can be prevented before they even find a system to disrupt. Part Two talks about Anomilies, data which has to be protected from harmful versions of software. With Social Media sites such as Myspace or Facebook, these sites need to be observed in order for a social ‘Honeypot”, to detect harmful profiles, as well as any other threats out there. Authors suggest a linkage defense system, which can bypass the setbacks brought on by past tools that tried to work. The Linkage system has the Honeypot’s and the defense system coexist together by having their management and communication tools work together. This system is based on a SMNP model code used in network management. Now Future intruders will be blocked by firewalls, if they try to hack into the system. Machine Learning is where we learn that computers operate under the system program that it’s been assigned. The concept of “Machine Learning”, keeps the computers adjusted to data structure and how to operate properly. Machine Learning has training models that separate into two phases in order to function. The first phase is estimating the data through training, by demonstrating tasks like recognizing animals in images or speech translation. The second phase is production. Here we see new data pass through the system in order to get the computer to complete an objective. The K-Means algorithm helps maintain clustering from certain systems. Eddabbah indicates that the “K –Algorithim is a faster solution to the issue it still has major setbacks” (Eddabbah, 2020, Page 3). The Decision tree helps branch out all data structures in case of testing. Part 4 jumps back into HoneyPot, this explains the different security communication networks. The first part is HoneyPot deployment which can monitor either Internal or External attacks on the system. With this we can see attacks that are carried out or attempted on any network. With DMZ’s (Demilitarized zones), HoneyPot function as a way to provide public internet service away from the computer’s internal network. Next, we have networks like KFSensor, Netfacade, Specter and CurrPorts. KFSensor is a server that watches out for connections with the network. Netfacade allows numerous network hosts interactions through unused IP a dresses. Networks also have to direct security threats to the firewall and eventually the honeypot will separate it to see if it’s serious or not. To conclude, network security is a very serious problem due to constant evolving and threats are hard to manage.


Kamel, N / Eddabbah, M / Lmoumen, Y/ Touahni, R “A Smart Agent Design for Cyber Security Based on Honeypot and Machine Learning”, Security & Communication Networks, (2020) ID 8865474 (9 Pages), 2020