Shamia Campbell 750-Word Expanded Definition of Interest of Things

Introduction

The purpose of the 750-1000 Word Expanded Definition is to explore the definition of the term “Algorithm” which is a set of rules followed in a problem solving operation. I will be defining the term “Algorithm” which is a list of rules and you can use data structures. In the project, I will introduce Algorithms with different defining quotations from confirmed sources and I will be able to explain and compare those definitions from the authors I found. Next, I will discuss the context of the word Algorithm for the sources I have. Finally, I will be giving details on my own definitions of Algorithm after the quotes I provided.

Definition

According to the McGraw-Hill Concise Encyclopedia of Science and Technology, an algorithm is, “A well-defined procedure to solve a problem. The study of algorithms is a fundamental area of computer science. In writing a computer program to solve a problem, a programmer expresses in a computer language an algorithm that solves the problem, thereby turning the algorithm into a computer program” (Algorithm, 2005, p.76). Essentially, an algorithm is a set of steps that can be followed to accomplish a task. The author tries to explain that Algorithms have a programmer that gives problems to solve. However, he is explaining how computer science people use algorithms in many different ways and when it comes to problem solving the computer language will perform in people minds. These definitions are related to the other because they all have to do with problem solving and unique this programmer is. “An algorithm is any well-defined procedure for solving a given class of problems. Ideally, when applied to a particular problem in that class, the algorithm would yield a full solution. Nonetheless, it makes sense to speak of algorithms that yield only partial solutions or yield solutions only some of the time. Such algorithms are sometimes called “rules of thumb” or “heuristics” (DEMBSKI, 2003, p.7).  Comparing the two definitions, these authors are mentioning well-defined procedure and its solving problems to get solutions. One author example is something different than the other author had mentioned in the second definition.

Context

In the Article “Security in the Information Age” by Craig Howard “Ciphers change the position or value of each individual character in the message. Ciphers are much easier to use than codes, which require large code books listing every word or group of words that will be used. A cipher, on the other hand, requires only a mathematical formula, called an algorithm, that can often be easily memorized. The message to be encrypted is called plaintext, the message after it is encrypted is called ciphertext” (Howard, 1995, p.33). The term algorithm is used in this quote to describe what a cipher is. The author equates an algorithm with a mathematical formula like a set of instructions, a mathematical formula tells us how to solve a problem. In the newspaper “Private Numbers” posted by  Ben Klemens explains how the new economy has appeared in mathematics which has to do with computer science. “The reader has no doubt been exposed to more than enough rhetoric about the fact that we live in an information age and our economic progress depends on the efficient movement and processing of information — and efficient information usage depends on better mathematical algorithms” (Klemens, 2006). The world depends on movements like matemcial because it is a way to understand the problem solving in the world. Algorithms play a big role in the world and if there wasn’t such a thing about it then it wouldn’t be a problem to solve. In the Article “Algorithm” written by Lee lerner is explaining how accomplish is algorithms and how far it can take you. “An algorithm is a set of instructions for accomplishing a task that can be couched in mathematical terms. If followed correctly, an algorithm guarantees successful completion of the task. The term algorithm is derived from the name al-Khowarizmi, a ninth-century Arabian mathematician credited with discovering algebra. With the advent of computers, which are particularly adept at utilizing algorithms, the creation of new and faster algorithms has become an important field in the study of computer science” (Lerner, 2014, p.131).  Algorithms are a success and it is from the 19th century which was years ago. That’s how you know that Algorithms are a great use.It should always be around for everyone uses it in the math field.  

Working Definition

The discussions above, I think Algorithms is the most important list of steps for solving problems. Algorithms are very important in my career field because I will be coming across  a lot of math when having to deal with computer programming and the math that I will have to solve so I can get a solution to what I’m trying to solve. Algorithms will be used years and years from now and it will never not be important. 

References

Algorithm. (2005). In McGraw-Hill Concise Encyclopedia of Science and Technology, 5th ed., McGraw-Hill Professional, 2005, p. 76. Gale eBooks, https://link.gale.com/apps/doc/CX3475800207/GVRL?u=cuny_nytc&sid=GVRL&xid=54c4b65b

Algorithm. (2003). In Encyclopedia of Science and Religion, edited by J. Wentzel Vrede van Huyssteen, vol. 1, Macmillan Reference USA, 2003, pp. 7-8. Gale eBooks, https://link.gale.com/apps/doc/CX3404200018/GVRL?u=cuny_nytc&sid=GVRL&xid=cc98c8c.

Klemens, B. (2006). Private Numbers.

Algorithm. (2014). In The Gale Encyclope dia of Science, edited by K. Lee Lerner and Brenda Wilmoth Lerner, 5th ed., vol. 1, Gale, 2014, p. 131. Gale eBooks, https://link.gale.com/apps/doc/CX3727800076/GVRL?u=cuny_nytc&sid=GVRL&xid=7b6e67ce

Teodor Barbu’s Expanded Definition of Cloud Computing

TO: Prof. Jason Ellis

FROM: Teodor Barbu

DATE: 10/21/20

SUBJECT: Expanded Definition of Cloud Computing

Introduction

In this paper I will discuss few definitions of the technology term cloud computing. Next, I will analyze some contextual discussions, and in the end, I will provide a working definition of the term.

Definitions

The origin of the term “cloud” in technology comes from the early networking drawings, where a multitude of server icons intersecting each other looked like a puffy cloud. In time, an icon with a shape of a cloud was adopted to express connectivity areas on a network. Amazon is one of the pioneer companies that envisioned the real potential usage of “The Cloud” and in 2002 they launched Amazon Web Services.     

In “Cloud Computing Bible,” Barrie Sosinsky defines the term as “Cloud computing refers to applications and services that run on a distributed network using virtualized resources and accessed by common Internet protocols and networking standards. It is distinguished by the notion that resources are virtual and limitless and that details of the physical systems on which software runs are abstracted from the user” (Sosinsky, 2011, p. 3). He points out that unlimited resources are just one click away and accessible from anywhere. Cloud services are available to the end user in a virtualized network without him knowing exactly how everything works.

Another interesting definition is laid out in the article “Cloud Computing: Survey on Energy Efficiency.” Its authors say, “Cloud computing is today’s most emphasized Information and Communications Technology (ICT) paradigm that is directly or indirectly used by almost every online user. However, such great significance comes with the support of a great infrastructure that includes large data centers comprising thousands of server units and other supporting equipment” (Mastelic, Oleksiak, Claussen, Brandic, Pierson, Vasilakos, 2014, p. 1). All the computers are networked together and share their resources according to everyone’s fast-paced environment. Companies offer cloud computing services like software as a service, platform as a service, or infrastructure as a service and we use those in our everyday browsing not even knowing most of the times.

Context

The next one is not quite a definition because it is incomplete, but it makes the transition into the contextual section. In contrast with the previous examples the authors of this next book discuss the ideas that many people are interested in what’s inside the cloud and that’s why many inside processes are made available to the user. The authors write, “There has been a lot of debate about what the cloud is. Many people think of the cloud as a collection of technologies. It’s true that there is a set of common technologies that typically make up a cloud environment, but these technologies are not the essence of the cloud” (Rountree, Castrillo, 2014, p. 1). Today cloud services are available to everyday people, not only to companies, so they need access to more information to choose these services and configure them according to user’s needs.

The next two contextual appearances are in articles from The New York Times. In the first one Kate Conger talks about Pentagon’s plan to upgrade military’s cloud computing platforms. In her piece she writes, “The Defense Department on Friday reaffirmed its decision to award a massive cloud computing contract to Microsoft, despite protests from Amazon, which had argued that President Trump interfered to prevent it from winning the $10 billion contract” (Conger, 2020, para 1). Even though Amazon is the market leader for cloud infrastructure, The Defense Department is likely to choose Microsoft. Here Conger uses the term to generalize a multitude of services and technologies that the military wants to modernize.

In the second article Daisuke Wakabayashi and Michael Levenson inform us about a situation where some Google services could not be accessed by their users on the East Coast of the U. S. for about one hour. They state, “The outages also seemed to affect corporate customers of Google’s cloud computing service, who rely on the technology giant for its computing infrastructure” (Wakabayashi, & Levenson, 2020, para 5). The term is used here to describe services that were down like Gmail, YouTube, Google Drive, Google’s search engine and other Google services. Even with powerful servers backed up in scattered locations all over the world, managing today’s massive volume of information is a challenge for all the technology giants out there.

Working Definition

In the beginning very few people knew exactly how the cloud works, but almost everybody recognized its power. Even today is a mystery for many, and some may think that all the data is really going up there somewhere in the clouds. We can admit that as a metaphor it may be true. In simpler terms we can say that through the cloud we externalized almost everything (and even more) that we do on our local computer. A cluster of machines is working together as a giant resource available and ready for us to use. Once we connect to the internet, we get access to anything from anywhere on any device we might have. In this way we can access applications that are not installed on our device or not even running on it. We can use power or storage without worrying about security or other expenses because an array of computers and servers all over the internet are sharing their resources with us through a network. 

References

Conger, K. (2020, September 4). Pentagon sticks with Microsoft for cloud computing contract. The New York Times. https://www.nytimes.com/2020/09/04/technology/jedi-contract-microsoft-amazon.html?searchResultPosition=1

Mastelic, T., Oleksiak, A., Claussen, H., Brandic, I., Pierson, J., Vasilakos, A. (2014). Cloud computing: Survey on energy efficiency. ACM Computing Surveys, 47(2), 1–36. https://doi.org/10.1145/2656204

Rountree, D., Castrillo, I. (2014).The basics of cloud computing : Understanding the fundamentals of cloud computing in theory and practice. Elsevier, Inc.

Sosinsky, B. (2011).Cloud computing bible. Wiley Publishing, Inc.

Wakabayashi, D., Levenson, M. (2020, September 24). Google services go down in some parts of U.S. The New York Times. https://www.nytimes.com/2020/09/24/technology/google-service-outage.html?searchResultPosition=2

Lia Barbu’s 750-Word Expended Definition of Virtualization

TO: Prof. Jason Ellis

FROM: Lia Barbu

DATE: October 21, 2020

SUBJECT: Expanded Definition of  Virtualization

Introduction

This document is an expanded definition essay of the technical term virtualization. In this document, I will try to define virtualization in the context of computer science. I will discuss several definitions of virtualization in the existing literature, followed by several contextual discussions. Finally, I will provide a working definition of the term.

Definitions

Oxford English Dictionary defines the verb virtualize as “to give virtual existence to (an intangible or abstract idea, concept, etc.) by perceiving it as, or demonstrating it to be, manifested or present in a real object, action, etc., within the world” (Oxford English Dictionary, n.d.). Virtualization is a derivative of virtualize. Bhanu Prakash Reddy Tholeti, in his article “Hypervisors, Virtualization, and Networking,” says, “Virtualization is the creation of flexible substitutes for actual resources that have the same functions and external interfaces as their actual counterparts, but that differ in attributes such as size, performance, and cost. These substitutes are called virtual resources; their users are typically unaware of the substitution” (Tholeti, 2014, p.387). It means that virtualization uses the existing resources and creates virtual hardware or software with the same quality as a physical resource and less cost. The magic of virtualization is that the users are not aware that whatever they use is only virtual, not physical. Virtualization is the process of extending a computer’s resources multiplying the hardware and software. In this definition, the author highlights the users’ satisfaction. The difference between physical and virtual resources is untraceable. Cerling, Buller, Enstall, and Ruiz offer a more complex and detailed definition in their book “Mastering Microsoft Virtualization.” They say, “In the last few years, the word virtualization has been a topic of discussion in most, if not all, IT organizations. Not only has it promised to save organizations money, but it has consistently delivered on that promise. The first area that this has generally been applied to is the server space. Organizations often take three, four, or more physical servers, create virtual machines running what previously ran on a physical server, and run those workloads on a single physical server hosting multiple virtual machines. Reducing the number of physical servers saves the cost of purchasing, maintaining, powering, and in some cases licensing those physical servers” (Cerling, Buller, Enstall and Ruiz, 2010, p. XVII). The authors emphasize how, through what it does, virtualization is a hot subject for IT companies. Virtualization creates on one server virtual machines with capacities of more than one server. Using virtualization, an organization uses its resources at more than maximum capabilities. Using virtualization, the company reduces the cost of resources and all the other pieces that come with them, like maintenance. It is explained that virtualization in the last few years has become necessary for IT businesses. Compared with the previous definition, this approach highlights the advantages virtualization brings to IT organizations. Pearce, Zeadally, and Hunt, in their article “Virtualization: Issues, Security Threats, and Solutions,” tell us, “In essence, system virtualization is the use of an encapsulating software layer that surrounds or underlies an operating system and provides the same inputs, outputs, and behavior that would be expected from physical hardware” (Pearce, Zeadally, & Hunt, 2013, p. 17). This definition is describing how virtualization uses software to create hardware precisely as a physical one. It refers strictly to how the virtualization process works. It generates a virtual version of a resource giving the possibility to run different systems at once on it. 

Context

Douglis and Kreiger tell us in their article “Virtualization” that, “Virtualization has been a part of the computing landscape for nearly half a century” (Douglis & Krieger, 2013, p. 6). This simple sentence gives us a lot of information about virtualization. It can be said that it synthetizes the age of virtualization in the computer science field. Jordan Shamir in his article “5 Benefits of Virtualization” says, “Despite being created decades ago, virtualization continues to be a catalyst for companies’ IT strategies” (Shamir, 2020, para 15). This shows how important virtualization in today’s IT environment. It is essential for a successful IT business.

Working Definition

Virtualization is the process of using the software in generating new resources with the same qualities and capabilities as physical ones, which is a plus for users and less costly, which is a plus for IT companies.  Even, in use for the last half of the century in this fast computing environment is still the primary mechanism in IT organizations’ plans.

References

Cerling, T., Buller, J., Enstall, C., & Ruiz, R. (2010). Mastering microsoft virtualization. Wiley Publishing, Inc

Douglis, F., & Krieger, O. (2013). Virtualization. IEEE Internet Computing, 17(2), 6–9. https://doi.org/10.1109/MIC.2013.42

Oxford University Press. (n. d.). Virtualization. In Oxford English Dictionary Online. Retrieved October 6, 2020, from https://www-oed-com.citytech.ezproxy.cuny.edu/view/Entry/267579?redirectedFrom=virtualization#eid93859051

Pearce, M., Zeadally, S., & Hunt, R. (2013). Virtualization: issues, security threats, and solutions. ACM Computing Surveys, 45(2), 17–17:39. https://doi.org/10.1145/2431211.2431216

Shamir, J (2020, April 8). 5 Benefits of Virtualization. IBM. https://www.ibm.com/cloud/blog/5-benefits-of-virtualization Tholeti, B. R. (2014). Hypervisors, virtualization, and networking. In C. DeCusatis (Ed.), Handbook of Fiber Optic Data Communication: A Practical Guide to Optical Networking (4th ed., pp. 387-416). Academic Press. https://link.gale.com/apps/pub/8DPU/GVRL?u=cuny_nytc&sid=GVRL

Adewale Adeyemi’s Expanded Definition of Immunology

Adewale Adeyemi’s Expanded Definition of Immunology

TO: Prof. Jason Ellis

FROM: Adewale R. Adeyemi

DATE: 10/08/2020

SUBJECT: Expanded Definition of immunology

Introduction

The purpose of this document is to write expanded definition on the term immunology which is a branch of biomedicine that deals with the structure and function of the immune system. The term immunology will be scarcely mention in this writing rather immune system will be made mention of a lot as immunology shines a brighter light on what compromises the immune system, its structure, how it works and cells that are essential to the immune system.

The topics covered in this paper will include the definition and structure of the immune system, types of immunity which is innate and adaptive, and immunopathology’s like autoimmunity.

Definitions

“The immune system refers to a collection of cells and proteins that function to protect the skin, respiratory passages, intestinal tract and other areas from foreign antigens, such as microbes (organisms such as bacteria, fungi, and parasites), viruses, cancer cells, and toxins.”( Warrington et al, 2011, p.1).  This means the immune system is a complex network of organs tissue and substances they make which helps the body fight infections and diseases.

“The immune system is a distinct organ in vertebrates, specialized to defend against invading infections or poisons in order to preserve the integrity of the organism.” (Stefan Offermanns, 2008, p.482). Here the immune system is a collection of organs in the vertebrates which is designed to fight against infections and diseases. Both definitions are both related in the sense that, tit could be a collection of cells or a distinct organ in the body but they both fight against infections and diseases.

The innate immune response has no immunologic memory and, therefore, it is unable to recognize or “memorize” the same pathogen should the body be exposed to it in the future (Marshall et al, 2018, p.1). This means innate immune response lacks the ability to quicky and specifically recognize a virus the body as encountered before and immediately initiate a corresponding response.

Adaptive immunity, on the other hand, is antigen-dependent and antigen-specific and, therefore, involves a lag time between exposure to the antigen and maximal response. (Marshall et al, 2018, p.1). In the case of adaptive immunity, it depends on a toxin or other foreign substance which induces an immune response in the body, it then uses immunological memory to learn about the threat and enhance the immune response accordingly. Both types of immunity are related in the sense that they both act together to defend the body against infections and diseases while they both differ with the presence of immunological memory in adaptive and inmate possess no immunological memory. The immunological memory simply quickly and specifically recognizes an antigen that the body has previously encountered and initiate a corresponding immune response.

Context

“First up, supercharging your immune system with specific foods, like garlic and honey, is an old debunked idea. “Simply put, you cannot ‘boost’ your immune system through diet, and no specific food or supplement will prevent you catching COVID-19/Coronavirus,” said the British Dietetic Association in a statement.” (Wong J, 2020, p.23). Put differently consuming food like garlic or honey or going on a diet will not boost the immune system nor prevent the body from contracting a deadly virus.

“What we do know is that some nutrients are essential to a healthy immune system, such as vitamin C, zinc and selenium. Certain dietary patterns, such as eating plenty of fruit, vegetables and wholegrains, may help reduce the inflammation that can contribute to complications in covid-19.” (Wong J, 2020, p.23). This implies consuming nutrients that are essential to the body like Vitamin C, Vitamin D or Zinc can help the body when its in the process of fighting these deadly viruses and can help reduce complications. 

Working Definition

I believe a breakthrough research in decoding how the human immune system prevents and controls disease is essential. Artificial Intelligence (AI) and machine learning are something in my field that I feel will be critical to this breakthrough. As we know, the immune system is a complex network of cells and proteins that function to protect the skin, respiratory passages, intestinal tract, and other areas from foreign antigens and decoding it would be paramount to understanding how it fights illness and diseases. Utilizing Artificial Intelligence (AI) and machine learning can help better process and analyze the immune system and help find better ways to fight disease everywhere as data can be processed a billion times faster.

References

Marshall, J. S., Warrington, R., Watson, W., & Kim, H. L. (2018). An introduction to immunology and immunopathology. Allergy, Asthma & Clinical Immunology, 14(1), N.PAG. https://doi.org/10.1186/s13223-018-0278-1

Warrington, R., Watson, W., Kim, H. L., & Antonetti, F. R. (2011). An introduction to immunology and immunopathology. Allergy, Asthma & Clinical Immunology, 7(S1), 1–8. https://doi.org/10.1186/1710-1492-7-S1-S1

Wong, J. (2020). Beware the corona diet. New Scientist, 246(3286), 23.

Offermans, S., Rosenthal, W. (2008). Encyclopedia of Molecular Pharmacology (2 volume set) (2nd ed. 2008 ed.) Springer.

Alvin Ferreira’s Expanded Definition of “Honeypot”

To: Professor Jason Ellis

From: Alvin Ferreira

Date: 10/20/20

Subject: Expanded definition of Honeypot

Introduction

When it relates to information technology and cybersecurity, this paper includes an expanded description of the word honeypot. I address several meanings of the word in this paper, several uses of the term in context, and finally, provide a working definition of the term. The document will inform the reader how important and necessary honeypot is. Furthermore, the document will include the benefits of honeypot in corporations and my overall thoughts.

Definition

      Honeypot provide fake information to intruders to watch their behavior. The authors Miguel A. Leguizamon-Paez, Maria A. Bonilla-Diaz, and Camilo A. Leon-Cuervo (2020) quoted “Honeypots in their most basic form are fake information servers, strategically positioned in a test network, which are fed with false information that is disguised as files of a confidential nature. In turn, these servers are initially configured in such a way that it is difficult, but not impossible, to be penetrated by a computer attacker, deliberately exposing them and making them highly attractive to a target hacker”. “The quote basically describes how honeypot is constructed to feed information that are not accurate to intruders.  Allowing the person controlling the honeypot to evaluate the intruder’s behavior

     Honeypot could be applied to benefit the companies’ strength. The authors Muhammet Baykara and Resul Das quoted “Honeypot systems are security tools that have recently been used in vulnerable information systems. They gain their security advantage as they are being attackable. These honeypot systems simulate real systems such as web, application, and database servers used in information systems, and they are trapping systems for attacker”. The quote states in small terms how honeypot looks for certain vulnerability within the system. The article discusses when literature finding are analyzed, it is possible to find three specific mechanisms related to the placement of honeypot schemes. In specific, honeypot networks can be located on the Local Area Network, the telephone and the Demilitarized Zone. There are benefits and pitfalls of any of these placement conditions. Depending on where they are located, honeypots are structured in forms and shapes that do not endanger network protection.   

Are Honeypot reliable in all businesses? The authors Anand Gupta, S.K.Gupta, IshaManu Ganesh, Pankhuri Gupta, Vikram Goyal and Sangeeta Sabharwal  cited “Though honeypot technology is not widely accepted, we feel it can be successful in certain environments. This leads to a new kind of honeypot called context dependent honeypot based on databases (S.K. Gupta et al., 2008). It is useful in a situation where there is a need to lure and quietly observe the actions of suspected masqueraders (for privacy violation). Such a pre-event scenario, where we act on the basis of apriori knowledge, before the violation actually occurs, has not yet been explored”. So by the article standards in a case where there is a need to lure and secretly monitor the behavior of accused masqueraders, it is beneficial. Such a pre-event situation has not yet been discussed; in which one behave on the basis of apriori information before the breach eventually happens.

The difference between the three article presented above is as followed; the first article discusses how false information is shared on honeypot to study behavior. The second article examines the strength of Honeypot in general. Lastly in the third article it explains if all corporations should rely in honeypot. The similarities between all quotes are they all described honeypot as being use to deceive an intruder and study their behavior.

Context

      The authors Anand Gupta, S.K.Gupta, IshaManu Ganesh, Pankhuri Gupta, Vikram Goyal and Sangeeta Sabharwal  quoted “Therefore, it is necessary to protect all types of information, in order to use it completely and at the same time, it can be protected and kept safe against any possible eventualities involving loss, distortion and/or use by unwanted entities.” The quote means all forms of information must be secured inorder to be fully used and, at the same time, secure and safeguarded against potential eventualities including misuse, manipulation and/or usage by unauthorized individuals.

     The authors  Muhammet Baykara and Resul Das stated “Information security has been one of the most important areas of research in the world of information in recent years. Many tools or software are used in computer network systems to provide corporate or personal information security”.The statement means digital security has been one of the most notable fields of study in the information sector. There are software being used in computer network systems for companies, or personal information protections.

     The author John Clay stated“Microsoft announced vulnerability CVE-2020-0601 and has already released a patch to protect against any exploits stemming from the vulnerability. Understanding how difficult it can be to patch systems in a timely manner, Trend Micro created a valuable tool that will test endpoints to determine if they have been patched against this latest threat or if they are still vulnerable”. The quote explains how Microsoft has confirmed the CVE-2020-0601 vulnerability and has already released a fix to protect against vulnerabilities triggered by the vulnerability. Trend Micro has built a helpful method that can monitor endpoints to assess if they have been patched against this new vulnerability or whether they are already vulnerable, recognizing how difficult it can be to repair devices in a timely way.

All the quotes above relate to each other. They all pertain to the function of honeypot. In this case, the honeypot normally finds out vulnerability and fixes the errors by studying intruders behavior.

In conclusion, through all the different articles obtained honeypot carried the same structure. Honeypot is supposed to deceive intruders and protect valuable information. So, are honeypot important? In my opinion, they are. Honeypot helps corporations notice their strength and weaknesses to keep their important information protected. In my career, I.T. operations. I will be attending Administrative protocols and hardware and software assistance. My responsibilities include technology management and quality assurance, as well as infrastructure maintenance and ensuring that finished goods fulfill both the demands and requirements of the customers.

Reference

Anand Gupta, S.K. Gupta, IshaManu Ganesh, Pankhuri Gupta, Vikram Goyal, & Sangeeta Sabharwal. (2010) Opaqueness Characteristic of a Context Honeypot System. Information Security Journal: A Global Perspective.vol.19 Issue 3, p142-152. 11p.
http://web.b.ebscohost.com.citytech.ezproxy.cuny.edu/ehost/detail/detail?vid=21&sid=b110f4ca-b64a-4c7a-aa3b-f7491114517c%40pdc-v-sessmgr01&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#db=a9h&AN=51253514

Miguel A. Leguizamon-Paez, Maria A. Bonilla-Diaz, & Camilo A. Leon-Cuervo (2020). Analysis of computer attacks through Honeypots in the District University Francisco Jose de caldas.Ingenieria y Competitvidad,jul2020, Vol.22 Issue 2, p1-13. 13p.
http://web.b.ebscohost.com.citytech.ezproxy.cuny.edu/ehost/detail/detail?vid=15&sid=b110f4ca-b64a-4c7a-aa3b-f7491114517c%40pdc-v-sessmgr01&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#AN=143694090&db=a9h

 John Clay. (2020, January 24). Trend Micro Creates Factory Honeypot to Trap Attackers. Retrieved October 07, 2020, from https://www.trendmicro.com/en_us/research/20/a/this-week-in-security-news-trend-micro-creates-factory-honeypot-to-trap-malicious-attackers-and-microsoft-leaves-250m-customer-service-records-open-to-the-web.html

Muhammet Baykara & Resul Das (2019)SoftSwitch: a centralized honeypot-based security approach using software-defined switching for secure management of VLAN networks.Turkish Journal of Electrical Engineering & Computer Sciences. Vol.27 Issue 5, pg 3309-3325. 17p. http://web.b.ebscohost.com.citytech.ezproxy.cuny.edu/ehost/detail/detail?vid=42&sid=4e66af52-c8d3-46b8-b3f9-615720b8f216%40pdc-v-sessmgr03&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#db=a9h&AN=138875578

Rouse, M. (2019, November 22). What is IT Operations and Why is it Important? Retrieved October 21, 2020, from https://searchitoperations.techtarget.com/definition/IT-operations

Jinquan Tan’ 750-Word Expanded Definition of Application Programming Interface

TO: Professor Ellis

FROM: Jinquan Tan

DATE: 10/20/2020

SUBJECT: Expanded Definition of Application Programming Interface

Introduction

The purpose of this document is giving the definition of API(Application programming interface).I will describe the definitions and context of API in the next two paragraphs.

Definition

“An Application Programming Interface (API) is a set of functionalities provided by a third-party component (e.g., library and framework) that is made available to software developers. APIs are extremely popular as they promote reuse of existing software systems (Johnson and Foote 1988)”(Sawant,2016,p.1349).This definition said API set of functionalities provided by a third-party component that is made available to software developers. APIs and is popular since the late 19 century.“The HITRAN Application Programming Interface (HAPI, [15,16]) represents a code library that was made in an attempt to combine a unified data and code approach to work with the spectroscopic data”(Kochanov,2016,p.16).This definition said API of their own(The HITRAN) is code the combine together and work with data. “We describe the Materials Application Programming Interface (API), a simple, flexible and efficient interface to programmatically query and interact with the Materials Project database based on REpresentational State Transfer (REST) principles”(Ong,2015,p.210). This definition said API is a simple interface that interacts with the database.Of all these definitions the similarity between them are they all said is component interaction. And the differences between them are they all have their own different API.

Context

“More than 50 companies, including I.B.M., Hewlett-Packard and Sun Microsystems, will announce tomorrow the single specification for application programming interfaces, or A.P.I.’s, which link a software operating system to applications like spreadsheet, data base and graphics programs. An operating system is the set of basic internal commands that enable a computer to function”(Lohr,1993,p.4).New York Time writer said that application programming interfaces were used by more than 50 companies which use applications like spreadsheet, data base and graphics programs. “In fact, there are examples of companies sharing and collaborating all over the internet, in order to be able to compete. For example, Facebook, Twitter and LinkedIn have opened up their platforms with APIs (application programming interfaces)”(Leboff,2011,p.151).This quote saying application programming interfaces enables others to build online businesses and applications that integrate with these companies. This approach helps to keep these social networks relevant, as they are constantly able to offer their users new tools and functionality through third parties. It also helps them to widen their reach, as every business that chooses to integrate with them becomes a de facto referral and free piece of marketing. “application programming interface  n. Computing a set of routines, protocols, and tools designed to allow the development of applications that can utilize or operate in conjunction with a given item of software, set of data, website, etc.; abbreviated API.” The Oxford dictionary giving the definition of application programming interface said that is something designed to allow the development of applications that can utilize or operate in conjunction.

Working Definition

Based on the definitions that I quoted and discussed, and the contextual uses of the term that I quoted and discussed, application programming interfaces are very related to my career major since I’m majoring in Computer Science Technology- Software development. My own definition of application programming interface is, API is a computing interface for interactions between multiple software intermediaries.

References

“application, n.”. OED Online. September 2020. Oxford University Press. https://www-oed-com.citytech.ezproxy.cuny.edu/view/Entry/9705?redirectedFrom=application+programming+interface (accessed October 19, 2020).

Kochanov, R., Gordon, I., Rothman, L., WcisƂo, P., Hill, C., & Wilzewski, J. (2016). HITRAN Application Programming Interface (HAPI): A comprehensive approach to working with spectroscopic data. Journal of Quantitative Spectroscopy & Radiative Transfer, 177, 15–30. https://doi.org/10.1016/j.jqsrt.2016.03.005

Leboff, G. (2011). Controlling to Sharing. In Sticky Marketing: Why everything in marketing has changed and what to do about it (pp. 145-160). Kogan Page. https://link.gale.com/apps/doc/CX2387000023/GVRL?u=cuny_nytc&sid=GVRL&xid=979c9472

Lohr, S. (1993, August 31). Standard Set For Unix Interface. The New York Times. https://www.nytimes.com/1993/08/31/business/company-news-standard-set-for-unix-interface.html?searchResultPosition=1. 

Ong, S., Cholia, S., Jain, A., Brafman, M., Gunter, D., Ceder, G., & Persson, K. (2015). The Materials Application Programming Interface (API): A simple, flexible and efficient API for materials data based on REpresentational State Transfer (REST) principles. Computational Materials Science, 97(C), 209–215. https://doi.org/10.1016/j.commatsci.2014.10.037

Sawant, A., & Bacchelli, A. (2016). fine-GRAPE: fine-grained APi usage extractor – an approach and dataset to investigate API usage. Empirical Software Engineering : an International Journal, 22(3), 1348–1371. https://doi.org/10.1007/s10664-016-9444-6

Mahim Pritom’s Expanded Definition of Artificial Intelligence

TO: Prof. Jason Ellis

FROM: Mahim Pritom

DATE: October 21st, 2020

SUBJECT: Expanded Definition of Artificial Intelligence

Introduction

The purpose of this 750-1000 Word Expanded Definition is to explore the definition of the term “Artificial Intelligence” which is a revolutionary invention of science in modern-day technology. I will be defining the term “Artificial Intelligence” in relation to machine learning and contextually how it operates in the different sections of the modern technology field. 

In this project, I will introduce Artificial Intelligence following several defining quotations from verified sources where I will discuss and compare those definitions from the authors. Next, I will discuss several quotations from a variety of sources where Artificial Intelligence is used in context. Finally, I will provide my own working definition of Artificial Intelligence after discussing all those quotations.

Definitions

Author  J. F. SMOLKO in the article “ARTIFICIAL INTELLIGENCE” defines AI as, “Artificial intelligence (AI) is that division of science, particularly of computer science, which attempts to emulate and extend with programmed and fabricated elements the cognitive and affective functions of animals and human beings.”(Smolko, 2003, p.765). Author SMOLKO tries to define Artificial Intelligence as the emulation of cognitive and affective functions that animals and we, humans perform daily. However, he emphasized computer science since machines will think and perform as the human mind thinks by using algorithms which is programmable by AI. In another article “BUSINESS FINANCE”, authors  Mark Jon Snyder and Lisa Gueldenzoph Snyder define AI as, “Artificial Intelligence (AI) is the branch of computer science and engineering devoted to the creation of intelligent machines and the software to run them. This process is “artificial” because once it is programmed into the machine, it occurs without human intervention.”(Snyder et al., 2014, p.31). Comparing the two definitions, all of the authors mention computer science and programmable algorithms that machines will learn to think like human minds also known as Artificial Intelligence. The author from the first definition didn’t mention human intervention whereas the authors of the second definition did which means when machines adopt programmable AI, they can operate and run the software simultaneously without human interventions.

Context

In a New York Times article “After the Pandemic, a Revolution in Education and Work Awaits” by  Thomas L. Friedman in an interview with Ravi Kumar, Artificial Intelligence is described as an automated system. “Now so many more people can play at that because you no longer need to know how to code to generate new software programs. Thanks to artificial intelligence, there is now “no-code software.’’ You just instruct the software to design some code for the application that you’ve imagined or need and, presto, it will spit it out.”(Friedman, 2020). Basically, the author gathered information about how AI is making our lives easier in the job sectors where AI will automate generate code according to the instruction given by the user whereas before we had to write all the codes from the scratch and as a human being, it takes up a lot of time to complete an application to run properly. In a blogpost “AI is Shaping the Future of Appointment Scheduling” posted by Ryan Williamson explains the importance of  AI in scheduling appointments. “AI-driven interface between the customer and the company can schedule appointments without human intervention to enable sending out confirmation emails, digital directions, etc. to help deliver a top-notch experience every time.”(Williamson, 2020). Ryan emphasizes an AI-driven interface where customers can schedule an appointment, collect basic pieces of information such as FAQ instead of calling the customer service, waiting in line, and manually schedule an appointment which is beneficial for both business and customers. Since an AI-driven interface can operate multiple tasks at the same time, the company can reduce labor and invest more in technology. In a CBS NEWS article “Facebook touts the use of artificial intelligence to help detect harmful content and misinformation” by Musadiq Bidar, he explains how Facebook is using AI to detect posts that violate the company’s policies and regulations. “Confronted with an onslaught of social media posts filled with misinformation and harmful content, Facebook said Tuesday it has begun to rely on artificial intelligence to boost its efforts to evaluate whether posts violate its policies and should be labeled or removed.”(Bidar, 2020). Billions of people use Facebook every day but not everyone follows the guidelines and policies. It is not possible for Facebook employees to manually detect and take down all those posts. Therefore, Facebook is using AI that can intelligently detect the violating posts and can track the devices from where the posts have been published all thanks to the programmable algorithms in combination with machine learning. Human eyes can make mistakes but we cannot escape with violations through the eyes of AI.

Working Definition

From the above discussions, I think Artificial Intelligence is the counterfeit of the human mind which is programmable to apply as an algorithm into the machines to operate and run software without human interruption. AI is very important in my major(software development) since developers use the help of AI to generate automated codes that will provide time to the developers in the backend to debug and test the application while the frontend developers can modify those automated codes according to the requirements without starting from the scratch.

References

Bidar, M. (2020, August 12). Facebook touts use of artificial intelligence to help detect harmful content and misinformation. CBS News. https://www.cbsnews.com/news/facebook-artificial-intelligence-harmful-content-misinformation/. 

Friedman, T. L. (2020, October 20). After the Pandemic, a Revolution in Education and Work Awaits. https://www.nytimes.com/2020/10/20/opinion/covid-education-work.html?searchResultPosition=1. 

Williamson, R. (2020, October 6). AI is Shaping the Future of Appointment Scheduling. Data Science Central. https://www.datasciencecentral.com/profiles/blogs/ai-is-shaping-the-future-of-appointment-scheduling. 

SMOLKO, J. F. (2003). Artificial Intelligence. In New Catholic Encyclopedia (2nd ed., Vol. 1, pp. 765-766). Gale. https://link.gale.com/apps/doc/CX3407700832/GVRL?u=cuny_nytc&sid=GVRL&xid=bb763593

Snyder, M. J., & Snyder, L. G. (2014). Artificial Intelligence. In Encyclopedia of Business and Finance (3rd ed., Vol. 1, pp. 31-35). Macmillan Reference USA. https://link.gale.com/apps/doc/CX3727500026/GVRL?u=cuny_nytc&sid=GVRL&xid=fa612e0a

Michael Lin’s Expanded Definition of “Magnetic Field”

TO: Prof. Jason Ellis  

FROM: Michael Lin  

DATE: October 20, 2020   

SUBJECT: Expanded Definition of magnetic field  

Introduction

The purpose of this document is to expanded definition of a word that we might use in our future careers. The team that I will be defining in this document is “magnetic field” in this document I will first discuss the definition of “Magnetic Field” follow by some context discussion and finally I will provide a working definition of the term “Magnetic field”   

Definition

Here is some definition of the term “magnetic field.” FromA Dictionary of Electronics and Electrical Engineering (5 ed.) it states that magnetic field is: ” The space surrounding a magnet or a current-carrying conductor and containing magnetic flux.” in other word magnetic field is a force field that surround a magnet or things that carrying current and containing magnetic flux. Another definition for the term magnetic field is from Anderson, Michael. Electricity. 1st ed. New York: Britannica Educational Pub: â€œThe region around a magnet in which magnetic forces can be seen is called a magnetic field. An electric current also creates a magnetic field”. This mean definition means that the area around a magnet that has magnetic force is call the magnetic field. The third definition for the term “Magnetic Field” are from Oxford English Dictionary, it state: â€œa field of the kind that is produced by a magnetic body (also by an electric current and a varying electric field) and acts on magnetic material.”  

 Base on the three definition that we get, we can see that the definition we got for the term “Magnetic Field” are similar in different area of study. It all defines as “a force field around a magnet or things that carry current near its surrounding. So we can conclude that the definition of the term “Magnetic field” won’t change if it was been use in different subject of the writing.  

Context

Here is some context that are using the term “magnetic field.” one article written by John Noble Wilford stated: â€œThe other major planets in the Solar System, Jupiter, Saturn and the Earth, have strong magnetic fields that trap and accelerate interplanetary particles.” This sentence means that the major planet in our system all has magnetic field that pull the interplanetary particle toward them. Also, the term “magnetic Field” in this sentence meant the force field that surround the planet.  

The second article that also has the term “magnetic field” are written by K. Lee Lerner and Brenda Wilmoth Lerner, its state: “The earth’s magnetic field may help some animals navigate as they migrate. People have been using magnetic compasses for navigation since the fifteenth century. Because it has been so important for navigation, the magnetic field has been mapped all over the surface of the earth.” This sentence meant that some animal would use the earth’s magnetic field to help them to navigate their way around during the cold season as they need to migrate to a warmer place. Human also use magnetic field to help them navigate around the world during the fifteenth century by using magnetic compass.   

The third article that has the term “magnetic field” are written by James Gorman, its state:” Birds have to have a way to detect a magnetic field, and some part of the brain has to register that information; it seems likely that another part of the brain then compares the incoming information to a stored map.” This statement meant that part of the bird brain was able to absorb the earth’s magnetic field and use it as information and create a map in their brain to help the fly around the world. In this sentence, the term “magnetic field” was described as wave of current that flow around the Earth and was been pick up by birds.  

Working Definition

Based on the quote and the definition from different source, now we can conclude that “Magnetic Field” is a force field that around a magnet or thing that carrying current. Many things in this world has magnetic field around them, for example our planet Earth has magnetic field around it. Even the human has magnetic field, but it is much weaker than the others. Many electrical engineers need to have knowledge about magnetic field for their career, this is the basic of electrical engineering.    

Reference

  1. Anderson, Michael. Electricity. 1st ed. New York: Britannica Educational Pub. In association with Rosen Educational Services, 2012. Print. https://ebookcentral.proquest.com/lib/citytech-ebooks/reader.action?docID=79  
  1. (2020). magnetic field. In Gorse, C., Johnston, D., & Pritchard, M. (Eds.), A Dictionary of Construction, Surveying and Civil Engineering. : Oxford University Press. Retrieved 4 Oct. 2020, from https://www-oxfordreference-com.citytech.ezproxy.cuny.edu/view/10.1093/acref/9780198832485.001.0001/acref-9780198832485-e-4228.  
  2. Gorman, J. (2012, April 26). Study Sheds Light on How Birds Navigate by Magnetic Field. Retrieved October 20, 2020, from https://www.nytimes.com/2012/04/27/science/study-sheds-light-on-how-pigeons-navigate-by-magnetic-field.html?searchResultPosition=9  
  3. Magnetic Field. (2003). In K. L. Lerner & B. W. Lerner (Eds.), World of Earth Science (Vol. 2, p. 358). Gale. https://link.gale.com/apps/doc/CX3437800369/GVRL?u=cuny_nytc&sid=GVRL&xid=06073f2f  
  4. Wilford, J. (1986, January 24). EVIDENCE OF MAGNETIC FIELD IS FOUND. Retrieved October 20, 2020, from https://www.nytimes.com/1986/01/24/us/evidence-of-magnetic-field-is-found.html  
  5. “magnetic, adj. and n.”. OED Online. September 2020. Oxford University Press. https://www-oed-com.citytech.ezproxy.cuny.edu/view/Entry/112270?redirectedFrom=magnetic+field+ (accessed October 04, 2020). 

Brianna Persauds’ 750-Word Expanded Definition of Bioengineering

TO: Professor. Jason Ellis

FROM: Brianna Persaud 

DATE: October 20, 2020 

SUBJECT: Expanded Definition of Bioengineering 

Introduction [Heading Level 2]

    The purpose of this document is to elucidate what bioengineering is. I will be discussing this term through multiple different sections. It will include several definitions of bioengineering, followed by several contextual discussions and end off with providing a working definition of the term.

 Definition [Heading Level 2]

  â€œBioengineering, as a field of research and applications, brings to bear not only engineering on medicine and biological organisms, but also a knowledge of biology on engineering designs. This helps assess the meaning of engineering as the extender of biology and ultimately helps engineering develop a clearer sense of its own nature and address the ethical issues involved in its modification of nature and the creation  of machines, that is artifacts. (Bugliarello, Mitcham, et al, 2005)”. In other words, bioengineering is a very important and upcoming field of study that bridges the gap to several different areas of science that are heavily related to one another. These areas of science, including medicine, biological organisms and engineering all coincide with another to form what is known as bioengineering. Bioengineering helps us to understand how engineering can extend the limitations of biological studies while at the same time enhancing biological studies through tackling issues within nature and ethics through biological engineering. “Eventually the interventions on the human body fulfilled other needs through diagnostic and curative tools and processes, from the application of bioengineering to bioastronautics starting in the 1960s (Konecci 1968) to X-ray visualization through computed tomography (CT), ultrasound scans, and magnetic resonance imaging (MRI), to hearing aids, surgical robots, autoanalyzers, DNA-sequencing machines, tissue engineering, and the application of engineering knowledge to the understanding of biological (Bejan 2000) and therapeutic processes.(Bugliarello, Mitcham, et al, 2005)” Furthermore, bioengineering opened the door to several operations that both were never thought of or were ever able to be conducting prior to its creation. Bioengineering has been able to completely alter countless lives in numerous beneficial ways through the creation of devices such as hearing aids, which allows people with poor hearing to be able to hear at a better rate, X-ray visualization which allows doctors to determine any breaks or misplacements in your body’s skeleton and tissue engineering that improves the surgical ability to replace or repair muscle tissues. In addition to all of these creations, bioengineering has also opened the door to MRI’s, surgical robots, ultrasound scans, autoanalyzers and many other methods that assist doctors in identifying the exact problem their patient is facing whether it be in the emergency room or at a regular check up. “Bioengineering is to design or construct using biological principles. Later chiefly: to produce or modify (a substance, organism, etc.) using the techniques of bioengineering, esp. genetic engineering.(Oxford University Press)”. Additionally, bioengineering is the pioneer to genetic engineering and altercation. “ All of these definitions are alike with one another because they all explain the overall understanding of what bioengineering ultimately is. For example, The first definition allows the reader to understand how bioengineering ultimately tackles issues in both nature and ethics while also being cut from the same cloth as medicine and biological organisms. The second definition allows you to have an interpretation of what bioengineering is and how several different aspects of science tie together as one in order to create what is known as bioengineering. However, one person may use this specific definition to illustrate how broad bioengineering can be and how it ushered in different procedures into the medical industry. The third definition gives a synopsis of what bioengineering is ultimately used to create and construct various principles in biology. 

Context [Heading Level 2]

  â€œIn fact, bioengineering is a truly interdisciplinary field, drawing on the techniques and knowledge of all branches of science and engineering. (Maquire, Novik, et al, p11, 2010) To add to this, bioengineering is the combination of both biology and engineering to benefit various aspects of life. “Chapter 9 on “ Tissue Engineering ” by Bernd Denecke, Michael Wöltje, Sabine Neuss and Willi Jahnen-Dechent discusses the approach to tissue engineering by combining cells and biomaterials into functional tissues. (Artmann, G.M, Chien, et al, p11, 2008)” Tissue engineering is a huge staple amongst the bioengineering industry. This procedure allows for surgery to be conducted in order to combine cells from other organisms or a different area of the body in order to repair or replace tissues that are damaged. “Nanotechnology is another field in which bioengineering is used to develop innovative medical procedures and products. Nanotechnology is the production of technology and materials at an extremely tiny level. (Burillo-Kirch, Christine, Cornell, et al, p84, 2016)” The engineering aspect of bioengineering has allowed access to nanotechnology being incorporated into the medical field. This allows doctors to complete procedures that allow them to enter the human body through small crevices and analyze what can’t be seen by the normal human eye. Nano technology is also used through medical nanorobotics, eye surgery, painful injections being substituted for eye drops, and many more possibilities. 

Working Definition [Heading Level 2]

   Taking away from the definitions and quotes utilized throughout my writing, in my own words bioengineering is a life changing aspect of the medical field that is derived from a combination of biology and engineering. Bioengineering has created and further developed ideas of the medical industry in an effort to establish new ways to better the lives of living organisms and the environment we live in. Due to bioengineering, we have established new procedures such as eye surgery, tissue engineering, ultrasound scans, etc. While at the same time innovating new material such as X-ray vision, nanorobotics, hearing aids, etc. Bioengineering is relevant to my career because engineering is involved in a variety of aspects that design new advancements in every aspect of life everyday. WIthout bioengineering, the medical field would not be able to move forward anywhere in the near future. 

Reference [Heading Level 2]

Artmann, G., & Chien, S. (2008). Bioengineering in Cell and Tissue Research. In Bioengineering in Cell and Tissue Research (1. Aufl.). Springer-Verlag. https://doi.org/10.1007/978-3-540-75409-1

Burillo-Kirch, C., & Cornell, A. (2016). Bioengineering: Discover How Nature Inspires Human Designs with 25 Projects. In Bioengineering. Nomad Press.

Bugliarello, George. “Bioengineering Ethics.” Encyclopedia of Science, Technology, and Ethics, edited by Carl Mitcham, vol. 1, Macmillan Reference USA, 2005, pp. 190-193. Gale eBooks, https://link.gale.com/apps/doc/CX3434900093/GVRL?u=cuny_nytc&sid=GVRL&xid=cd964595

Accessed 6 Oct. 2020.

In Law, J., & Martin, E. (Eds.), Concise Medical Dictionary. : Oxford University Press. Retrieved 6 Oct. 2020, from https://www-oxfordreference-com.citytech.ezproxy.cuny.edu/view/10.1093/acref/9780198836612.001.0001/acref-9780198836612-e-1093.  

Lachner, E., & Zumbusch, A. (2015). Bioengineering. In Bioengineering. Rosen Publishing Group 

Maguire, T., & Novik, E. (2010). Methods in Bioengineering: Alternative Technologies to Animal Testing. In Methods in Bioengineering. Artech House.

OED Online. (September 2020) “bioengineering. v.” Oxford University Press.

https://www-oed-com.citytech.ezproxy.cuny.edu/view/Entry/273299?rskey=omdpBX&result=

Accessed October 06, 2020.

 

Gladielle Cifuentes’ 750-Word Expanded Definition of Military Cybersecurity

Introduction

As the internet and technology began to see many advancements, organizations realized the threats that can come from not having a security system in place.  These organizations include the U.S military. According to Kilroy (2008), “In the mid-1990s, the U.S. military recognized a growing threat to its informational architecture as well as the nation’s critical infrastructure from cyber warfare.” (p. 439).  For this paper, I will be defining the term ‘Military Cybersecurity’ and how it is viewed in different definitions. I will cite definitions and explain in context how authors and organizations view this term. 

Definitions

The Department of Defense Instruction 8500.01 (2014) defines cybersecurity as the “prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation”. Cyber security threats to the military have been around for many years and the U.S government has been a victim to hackers from all around the world. As per the International Standards Organization, the definition of Cyber security is “the preservation of confidentiality, integrity, and availability information in cyberspace” (ISO, 27032). Very similarly, these organizations use the term ‘integrity’ when defining Cyber security. 

According to Efthymiopoulos (2019) “Cyber-security is a method of e-protection. It is a framework policy of and for defense when reflective to a political-military alliance such as NATO (North Atlantic Treaty Organization)” (pg.1). The definitions listed are related to how the military views cybersecurity and what is the DoD’s expectation is on how to control the military networks and implement cyber security protocols. 

Context

Vacca (2011), mentioned that “both the US Navy and the US Air Force were originally founded to project US interests into non-governed common spaces, and both have established organizations to deal with cyber security. “(p. 159). Although this refers to two different branches of services, the overall goal for the DoD is to strengthen its cyber security. According to Krasznay & Hamornik (2019), “Governmental and military IT systems should be protected from criminals, foreign intelligence services and armed forces in cyberspace, just to name a few challenges. These elements require a new approach to cybersecurity especially in national security” (p. 291). Overall, any organization that uses technology devices, networks, or simply function through the internet, can encounter cyber security threats, to include the military. Boeke, Heinl & Veenendaal (2015). “Armed forces across the globe are investing in their capacity to defend their networks and systems, and increasingly, preparing to conduct military operations in cyberspace” (p. 70), the U.S Military, along with militaries around the world, understand the severity of cyber threats and how it could be a detrimental concern to their security information and governments.

Working Definition

The term Military Cybersecurity can be defined in many ways. Overall, specifically referring to the military, cybersecurity will continue to gain threats from hackers and it is extremely important to learn the new threats that occur and keep those who are involved and work with the military up to date with ways to prevent any cyber-attacks from happening. Cyber-attacks raise security concerns to government officials. For the major that I am studying and the career path that I chose, I believe that it is highly advisable for me to be aware of the cybersecurity concerns that the military faces. As a military member, I am aware of the constant trainings that the Air Force provides for its members on cybersecurity and awareness, and the important roles that we have in military cybersecurity. 

References

Kilroy, R. J., Jr. (2008). The U.S. Military Response to Cyber Warfare. In L. J. Janczewski & A. M. Colarik (Eds.), Cyber Warfare and Cyber Terrorism (pp. 439-445). Information Science Reference. https://link.gale.com/apps/doc/CX2555100065/GVRL?u=cuny_nytc&sid=GVRL&xid=3af1f3ab

Efthymiopoulos, M. P. (2019). A cyber-security framework for development, defense and innovation at NATO. Journal of Innovation and Entrepreneurship, 8(1). doi:10.1186/s13731-019-0105-z

Snyder, D. (2015). Improving the cybersecurity of U.S. Air Force military systems throughout their life cycles. Santa Monica, CA: RAND Corporation.

Vacca, W. A. (2011). Military Culture and Cyber Security. Survival, 53(6), 159-176. doi:10.1080/00396338.2011.636520

Cyber Security Objectives. (2012). Cyber Security Policy Guidebook, 1-267. doi:10.1002/9781118241530.ch3

Krasznay, C., & Hamornik, B. (2019). Human Factors Approach to Cybersecurity Teamwork – The Military Perspective. Advances in Military Technology, 14(2). doi:10.3849/aimt.01296

  Boeke, S., Heinl, C., & Veenendaal, M. (2015). Civil-military relations and international military cooperation in cyber security: Common challenges & state practices across Asia and Europe. 69–80. https://doi.org/10.1109/CYCON.2015.7158469