For this collaborative project, Me and My group: Shital BK, Albert Chan, Gladielle Cifuentes, and Mahim Pritom have created this 4000-6000 research paper about CyberSecurity Benefits due to Virtualization
For this Project, I created an instruction manual on how to install and configure a Virtual Machine using VMware Workstation Pro 16
TO: Prof. Jason Ellis
FROM: Kevin Andiappen
SUBJECT: Expanded Definition of cyber-security
The purpose of this document is to give an expanded definition of the term cyber-security. I will be defining cyber-security in the context of information technology (IT). In this document, I will be discussing several definitions of cyber-security that I have discovered, followed by a few contextual examples. In closing my expanded definition, I will provide my very own working definition of cyber-security based off of my research.
The first definition comes from Gale eBooks. It defines cyber-security as, “A critical and necessary component of computer systems, implemented to protect computer users and networks from threats from nefarious cyber actors, to protect them from computer disruptions that are intended and unintended, as well as to prepare for unpreventable natural disasters.” (Harper, 2015, pp. 123). Cyber-security is looked at as a necessary component used to protect users and networks from hackers or anyone with malicious intent. Additionally, it can also help prevent disruptions in computer systems and networks whether it be intentional or unintentional and helps us prepare for disaster recovery. For example, say a company hires a new IT intern and gives him the responsibility of managing the user accounts on the domain. He creates a new user account and is supposed to give only the standard permissions to this user. However, he mistakenly grants the user administrator privilege’s. This is a bad because the user will have equal access to the domain administrator and will be able to login to any of the workstations in the office and make unauthorized changes to all of the other employees’ files and applications. All of this can occur because of that technicality.
The second definition also comes from Gale eBooks. It says, “Cyber-security provides security against threats to data that resides on computer architecture, hardware, software and networks connecting in cyberspace.” (Harper, 2015, pp. 123). As we see in the first definition, cyber-security is defined as a tool or component used to prepare for and prevent cyber attacks and natural disasters. In this definition, cyber-security is described as providing security to the data that is contained in the system. This ranges from the architecture, hardware, software, and network. Cyber-security is defined here as protecting the data in the organization rather than focusing on securing the network or computer systems. For example, Netflix has millions of users that stream content to their devices. In order to use Netflix, you have to obtain a subscription, which requires your credit card information. If Netflix became victim to a cyber-attack, every user’s credit card information would become compromised. So you see, even though protecting our systems is a top priority, the data we have is even more valuable.
The third definition comes from barracuda.com. It defines cyber-security as, “the practice of protecting technological systems, networks, and programs from digital attacks, damage, or unauthorized access.” (Barracuda, 2020, page 1). This defines cyber-security as a practice of protecting our computer systems from unauthorized attacks and access. Think of it this way, what is the purpose of having a lock on your front door? Why do we install security cameras in and outside of our houses? Its for protection. The same way cyber-security works. We install counter measures to prevent unauthorized use of our resources. This quote is similar to the first two I mentioned because we are talking about protection. Whether its about protecting the data itself or the system, the idea of anticipating and preventing cyber attacks is the common goal.
“Individual users can suffer greatly from a cyber-security attack. They risk identity theft, extortion, or total data erasure. This fallout of these attacks at a national level is even greater. Local and global infrastructure is built on connected technology and guaranteeing the security of this network is essential for the productivity and safety of an always online society.” (Barracuda, 2020, pp 1). This implies how important cyber-security is for everyone. Ranging from the everyday user, to national security. Without it, everyone is susceptible to having their identity/data manipulated or erased.
“Some fear we are creating future hackers by teaching students how to penetrate computer networks and systems, but that is not the case. To fix something, you first must know how it works; in essence, you must know how to break it in order to fix it. Once students know what is broken, they can fix it or make it more secure.” (Crespo, 2020, pp. 20). In this context, the term cyber-security is used as an educational tool. Students learn how to penetrate computer systems to understand the point of view of a hacker. The goal of this is, if you understand the mind of a hacker, then you will know how to anticipate their attacks.
As it relates to my major/career field, cyber-security is the study and/or practice of the protection of computer systems and networks. With out this, our IT infrastructures would be completely open to disruptions and attacks. Cyber-security ensures that only authorized users are given access to certain systems and parts of the network. In addition, it also is used as a way of securing the data within the computer and the network. Essentially, it provides protection for both the equipment and the data kept inside the infrastructure.
Barracuda Networks. (n.d.). Retrieved October 12, 2020, from https://www.barracuda.com/glossary/cyber-security
Crespo, M. (2020). let’s collaborate! cyber security. Technology & Engineering Teacher, 80(2), 20–21. Harper, K. A. (2015). Cybersecurity. In C. T. Anglim (Ed.),
Privacy Rights in the Digital Age (pp. 123-126). Grey House Publishing. https://link.gale.com/apps/doc/CX6403900059/GVRL?u=cuny_nytc&sid=GVRL&xid=eb92a570
TO: Prof. Ellis
From: Kevin Andiappen
DATE: Sept. 20, 2020
Subject: 500-word Summary
This is a 500-word summary of the article “THE DANGER OF USING ARTIFICIAL INTELLIGENCE IN DEVELOPMENT OF AUTONOMOUS VEHICLES,” by Gabor Kiss, which discusses the risks that come from having Artificial intelligence in automobiles.
Although self-driven cars have recently become popular, the idea has been around for years. A car that would one day be fully autonomous eliminating the need for a driver. Technology could succeed where humans fail. According to Kiss, “The expectation of spreading self-driven cars lies in the hope of significantly decreasing the 1,3 million death toll accidents world-wide, which are caused by human factor 90 % of the time” (Kiss, 2019, p. 717). In other words, the goal of self-driving cars is to decrease the number of car accidents caused by human error. This is because artificial intelligence can process data quicker than humans, which will decrease the reaction time in a situation.
At the end of November 2018, Tesla cars traveled a total of one billion miles in autonomous mode. Statistics show one accident occurs every 3 million miles. The department of transportation says there is an accident every 492,000 miles in America making self-driving cars seven times safer. The society of automotive engineers created a scale for determining the intelligence and capabilities of a vehicle. It goes from 0 to 5.
NVIDA is a company that incorporates deep learning for AI. With this technology, cars can create a lifelike, detailed interactive world to do fast calculations within seconds. There is no 100% safe solution for self-driving cars. However, using AI will come close to achieving this because it will be able to respond to traffic situations much faster than humans will. However, drivers may abuse it by cutting in front of cars intentionally forcing it to brake or going in front of them at highway entrances.
If you were to change a road closed sign to speed limit is 50 mph sign, the AI may not be able to tell which sign is legitimate which can cause an accident. This can happen to a human driver and an AI. Digital light technology works like a projector. It can shine on the road to project symbols and/or lanes. This can be used to deceive a self-driving car to follow the fake lane and cause it to crash or go to another location.
In conclusion, Artificial intelligence is a challenge for developers because it requires them to prepare for every possible scenario. The safety precautions used in self-driving cars to prevent accidents could be reprogrammed to cause accidents. All of the scenarios mentioned are one of many possible dangers that can come from self-driving cars. Developers need to be aware of these situations so that they can properly educate the AI.
Kiss, G. (2019). The Danger of Using Artificial Intelligence in Development of Autonomous Vehicles. Interdisciplinary Description of Complex Systems, 17(4), 716–722. https://dx.doi.org/10.7906/indecs.17.4.3