Weekly Writing Assignment, Week 11

This is an individual writing assignment based on your team’s collaborative project. Each team member should write a short memo of no more than 250-words addressed to Prof. Ellis that describes what research responsibility he/she has been delegated or volunteered to do this week for the team project and include three IEEE references to articles and/or ebooks found through the City Tech Library that might be useful for your team’s research. Copy-and-paste your memo into a comment made to this post.

8 thoughts on “Weekly Writing Assignment, Week 11”

  1. TO: Professor Ellis
    FROM: Jared Williams
    DATE: November 24, 2021
    SUBJECT: Delegated Responsibilities

    For my group I have delegated the section describing what can happened once a target is successfully phished, and the section about defending against phishing. Michael will explain what phishing is as well as its how it came to be, and Victor took on the section describing how it was done in the past vs. today. We are all doing our own research and in communication with regards to our progress. There may be more sections added between now and submission, but these are the sections we have so far.

    1. *For my group I have delegated the section describing what can happened once a target is successfully phished and the section about defending against phishing to myself. Michael will explain what phishing is as well as its how it came to be, and Victor took on the section describing how it was done in the past vs. today. We are all doing our own research and in communication with regards to our progress. There may be more sections added between now and submission, but these are the sections we have so far.

      My sources so far for my section are:

      B. Hoanca, K. Mock, “Phishing Attacks and Countermeasures: Implications for Enterprise Information Security,” Advances in Enterprise Information Technology Security, IGI Global, p.221-236, 2007. [Online]. Available: https://link.gale.com/apps/doc/CX2837900023/GVRL?u=cuny_nytc&sid=bookmark-GVRL&xid=fb91e0ea, Accessed: Dec 1, 2021.

      T. Mighell, “Protecting your online world with two-factor authentication,” Law Practice, Vol. 41 Issue 2, March-April 2015. [Online]. Available: https://link.gale.com/apps/doc/A404445717/ITOF?u=cuny_nytc&sid=bookmark-ITOF&xid=109ddbaf, Accessed: Dec 1, 2021

      H.R Rao, M. Gupata, and S.J. Upadhyaya, “Swallowing the Bait, Hook, Line, and Sinker: Phishing, Pharming, and Now Rat-ing!,” Managing Information Assurance in Financial Services, p.241-258, 2007. [Online]. Available: https://link.gale.com/apps/doc/CX2863200020/GVRL?u=cuny_nytc&sid=bookmark-GVRL&xid=0723dc02, Accessed: Dec 1, 2021.

  2. To: Prof. Ellis
    From: Mamadou Sakho
    Date: November 24, 2021
    Subject: Delegated work

    The portion of my group’s work delegated to me is to talk about how to prevent cyber-attacks and why it is important to prevent them. Cyber-attacks are calculated attacks initiated by malicious hackers intended to do harm to peoples’ or companies or government computers or network systems. Along this process, several things happen such as theft of personal information, medical information, personal assets/financial, etc. These attacks are sometimes enabled by governments in order to attack another government or in reply to an attack. The result of these attacks can be devastated. For example, when a person’s valuable information is stolen, that person can be blackmailed. In order to get back the stolen information, the person has to pay the ransom, or his/her information is sold to the black market. It could be even worse when infrastructures such as hospitals or nuclear sites are targeted because it could result in a lot of lives being lost. For example, if a hospital’s power is turned off, people may die, and electrical materials may be destructed. For these reasons and other similar reasons, cyber-attacks are to be taken seriously and invested in the fightthem. Anti-virus is good in fighting cyber-attacks but there are several steps to be taken prior such as having qualified personnel to deal with upcoming threats in addition to having anti-virus software.

    Reference:
    [1] Henry, S., & Brantly, A. F. (2018). Countering the Cyber Threat. The Cyber Defense Review, 3(1), 47–56. http://www.jstor.org/stable/26427375

    [2] David, M. W., & Sakurai, K. (2003). Combating Cyber Terrorism: Improving Analysis and Accountability. Journal of Information Warfare, 2(2), 15–26. https://www.jstor.org/stable/26502765
    [3] Paul, Ian. “Avg Antivirus for Mac: a Good Free Option.” Macworld – Digital Edition, vol. 37, no. 7, July 2020, pp. 25–28. Academic Search Complete, EBSCOhost, http://citytech.ezproxy.cuny.edu:2048/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=143690640&site=ehost-live&scope=site. Accessed 5 Dec. 2021.
    [4] Daş, Resul, and Muhammed Zekeriya Gündüz. “Analysis of Cyber-Attacks in IoT-Based Critical Infrastructures.” International Journal of Information Security Science, vol. 8, no. 4, Dec. 2019, pp. 122–133. Academic Search Complete, EBSCOhost, http://citytech.ezproxy.cuny.edu:2048/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=141353031&site=ehost-live&scope=site. Accessed 6 Dec. 2021.

  3. TO: Prof. Ellis
    FROM: Edwin Baez
    DATE: 12/06/2021
    SUBJECT: Delegated Work

    For my group, we collectively came up with topics within our general topic and we all decided on 4 topics to write about. After all four topics were established we each chose which topic we wanted to dive into. For my role, I will be researching how the global pandemic and high demand has led to shortages in the manufacturing industry derived from the shortage of chips and microchips. My research will be based on the cause of the chip shortage, and insight on whats going on with companies and their status now with the pandemic going on. here are some references that i have picked out so far.

    References:
    [1] “Now, chip shortage threatens industry; Growing auto output is taxing the supply.” Automotive News, vol. 95, no. 6964, 14 Dec. 2020, p. 0001. Gale Academic OneFile, link.gale.com/apps/doc/A645315690/AONE?u=cuny_nytc&sid=bookmark-AONE&xid=6294833b. Accessed 6 Dec. 2021.

    [2] “Chip shortage stings Japan’s agile industry.” Automotive News, vol. 95, no. 6992, 28 June 2021, p. 0003. Gale Academic OneFile, link.gale.com/apps/doc/A667059570/AONE?u=cuny_nytc&sid=bookmark-AONE&xid=e1719eef. Accessed 6 Dec. 2021.

    [3] S. Venkatesan, “Council Post: Why the global chip shortage is lasting so long and why it will have a positive end,” Forbes, 17-Nov-2021. [Online]. Available: https://www.forbes.com/sites/forbestechcouncil/2021/11/17/why-the-global-chip-shortage-is-lasting-so-long-and-why-it-will-have-a-positive-end/?sh=1bfab2ad153b. [Accessed: 07-Dec-2021].

  4. TO: Prof. Ellis
    FROM: Gani Graceni
    DATE: 12/07/2021
    SUBJECT: Delegated Work

    Our group had a virtual meeting where we discussed and were able to break down the main topic of our project. Based on the number of the participants we decided to have 4 sub topics so each can choose one and elaborate based on reading and research. For our group the main topic is “IC chips and Processors Shortage” and as a sub section I have been delegated to work on the reasons why the chips are shorted and how the inactivity in the industrial sector creates delays and shortages to manufacturing processes. This sub section will takes a big role on our project as a whole and will keep me busy with some research on this worldwide technological issue that almost all industries have in common. I have utilized some sources that will be listed on the reference section below:

    Wu, Xiling, Caihua Zhang, and Wei Du. “An Analysis on the Crisis of ‘Chips Shortage’ in Automobile Industry ——Based on the Double Influence of COVID-19 and Trade Friction.” Journal of physics. Conference series 1971.1 (2021): 12100–. Web.

    “Asia Trade Brief: The Global Chip Shortage.” Country Report: Singapore (2021): n. pag. Print.

    Shen, Yuelin, and Sean P Willems. “Modeling Sourcing Strategies to Mitigate Part Obsolescence.” European journal of operational research 236.2 (2014): 522–533. Web.

  5. TO: Professor Ellis
    FROM: Pape Diop
    DATE: December 17, 2021
    SUBJECT: Delegated Responsibilities

    As a member of my group, I have delegated the section describing when you have been phished and what actions you need to take to save yourself. I have started doing researches on this section and am pretty much done with my section. I collected some information on what actions are needed to take when phished by Yael Grauer, a former contributor, highly experienced in security and online privacy.[1]

    Reference:

    [1] Yael Grauer, “What To Do When You’ve Been Phished”
    available: https://www.forbes.com/sites/ygrauer/2017/01/30/so-youve-been-phished/?sh=61e9520f3a61

  6. TO: Prof. Ellis
    FROM: Rosario Garcia
    DATE: 12/20/2021
    SUBJECT: Team Project Topic

    The purpose of this memo is to discuss what topics that we have considered in .
    We discussed topics like computer. Through our discussion.
    We concluded that although it’s a very important to choose specific that cyberattacks. Many of us divide the writing paper and website in parts. I collected information in cyberattack in the pandemics.

  7. TO: Prof.Ellis
    FROM: Nafisa Tabassum
    DATE: 12/21/2021
    SUBJECT: Team Project Topic

    As a group member, I have delegated the section of the solution of phishing. I have done some research on it and found all the prevention methods. I will explain all of the main ideas and summarize the whole session.

Leave a Reply