To: Prof. Ellis

From: Anthony Cuomo

Date: 10/27/2021

Subject: Expanded Term Definition of Secure

Introduction

The purpose of this document is to teach the reader the differences between the different definitions of the word secure. A brief example of two different definitions will be shared, along with the history, etymology and some quotes from articles that I feel encapsulates the definitions best.

Definition

“Who hath oftner waged warres then he? Escapes secure him not: he owes the price [1].” This quote from “The misfortunes of Arthur” by playwright Thomas Hughes in 1587 was the first known usage of the term secure. From reading the sentence and using context clues, we can infer that the definition of secure in 1587 was the same definition used in modern language. To secure most commonly means to keep safe from danger or harm. This is not the only definition of secure that has been seen throughout the years though. Like a lot of words in the English language, secure has multiple meanings depending on the context that the word is being used. 

Context

The word secure is derived from the Latin word “securare”, which means to keep safe from harm [1]. This will probably be the first definition you will see when searching for the word secure in today’s day and age. To keep safe from danger or harm. As in to secure personal information or even to secure a space for a person to access safely. When speaking of securing something, JD Stahl had this to say about Elizabeth Enright’s writing style “She is not naive about the terrors and sufferings of children; she merely chooses to place the joyful and secure features of children’s lives in the foreground [2].” Elizabeth Enright, according to Stahl, uses a writing style which places the positive or “Secure” aspects of their lives into the forefront of the setting. A good way to think about the term secure is that it is not always used as a verb, but you can use it as an adjective to describe something. 

The English language is interesting in the way that a single word could have more than 1 meaning. Another popular definition you could see for the word secure is to make sure something is obtained. Here is a quote from a New York Times article by Julia Preston and Fernanda Santos about how Latinos gained influence in a national election. “Latinos turned out in record numbers on Tuesday and voted for President Obama by broad margins, tipping the balance in at least three swing states and securing their position as an organized force in American politics with the power to move national elections [3].” As we can see with this quote, the authors are not talking about how something is safe or out of harm’s way but instead uses secure as a way to show how Latinos were able to obtain something. In the cast that Julia Preston and Fernanda Santos showed, the thing that was obtained was political influence and power.

Working Definition

The term secure has a lot of uses when it comes to computer security. Anything that is done on a computer on a public domain is going to have some sort of security protecting it. Programmers and cyber security experts use the term secure all the time. One that is seen and heard often is to make sure your network is secure. This means that you should make sure that the network that you are working on is safe from harm from potential cyber-attacks or breaches. Cyber security can also use the other definition of secure that has been described, which is to make sure something is obtained. For example, securing a connection to a VPN. The thing being secured, or obtained, here is the connection from the user to the VPN servers. A VPN is a tool that is used to hide your IP address and is used to encrypt any type of data that would be sent via the internet [4].

References:

[1] “secure, v.” OED Online, Oxford University Press, September 2021, 

www.oed.com/view/Entry/174648. Accessed 16 October 2021

[2] Stahl, J.D. “A secure world of childhood: the artistry of Elizabeth Enright.” Hollins Critic, vol. 35, no. 2, Apr. 1998, pp. 1+. Gale Literature Resource Center, link.gale.com/apps/doc/A130929968/GLS?u=cuny_nytc&sid=bookmark-GLS&xid=1fb2d005. Accessed 15 Oct. 2021. 

[3] J. Preston and F. Santos, “A record Latino turnout, solidly backing obama,” The New York Times, 08-Nov-2012. [Online]. Available: https://www.nytimes.com/2012/11/08/us/politics/with-record-turnout-latinos-solidly-back-obama-and-wield-influence.html. [Accessed: 16-Oct-2021].  

[4] “What is a VPN? virtual private network benefits,” NordVPN, 10-Nov-2021. [Online]. Available: https://nordvpn.com/what-is-a-vpn/. [Accessed: 11-Nov-2021].

[5] “Secure,” Merriam-Webster. [Online]. Available: https://www.merriam-webster.com/dictionary/secure. [Accessed: 16-Oct-2021].  

500-word summary on Cyber-attacks and Countermeasures

From: Anthony Cuomo
Date: 10/6/2021
Subject: 500-word summary on Cyber-attacks and Countermeasures. 

Cyber-attacks are becoming more frequent and sophisticated due to human error, which are not being accounted for properly by current cyber security protocols. There are three main types of protection tools that are being used in the fight against cybercrimes such as, blacklisting, heuristics, and a hybrid of the two techniques. Cyber protection tools are not fool proof, and users need to learn how to identify a potential attack and how to identify what measures to take to prevent said attack by learning cyber-attack taxonomy and classifications. [1, p. 37]

The author argues that this article is trying to contribute to the advancement of helping users identify and assess potential cyber security threats online. Cyber-attacks are a type of attack that targets the users’ vulnerabilities, these attacks including phishing, drive-by downloads, and social engineering. There are technical and non-technical tools that are being used to help fight against cybercrimes. One of the non-technical tools being implemented is the legislative tool which passes laws against illegal cyber activities. Another non-technical tool that is being used is training and education tools, one of the tools being used is the Cybersecurity Nexus by ISACA.  

Anti-virus software is the most common approach in dealing with cyber security threats, but as the threats get more sophisticated, it could take upwards of hundreds of days before the software can provide adequate protection from a new attack. According to the author, “It is important to educate users, to improve awareness of threats, risks, and what security warnings are about”. More measures need to be taken to help educate people on potential risks. In the meantime, there are web browser filters that utilize the blacklisting technique which compares the requested web page with a database of currently known fake web pages, but this method comes with a drawback of having to constantly update and maintain an increasingly large amount of fake web pages. Google uses a tool called safe browsing, that has two flaws in which users can potentially be tracked and websites will not get filtered if users do not synchronize their accounts.


Mozilla Thunderbird and Internet Explorer use a protection tool called CANTINA which uses the heuristic technique, the drawback to this is the protection will sometimes block legitimate sites and label them fraudulent. Fuzzy data mining technique is heuristic based and tries to determine the legitimacy of websites through associating the pages URL and domain identity. The Neuro-Fuzzy model attempts to decide a webpage legitimacy by going through a list of five inputs that would make it possible to determine the legitimacy in real time. There are three protections tools called Anti-phishing Phil, CyberCIEGE and BigAmbition, which the goal is to help educate users and increase awareness in potential cyber security risks. Smart Protection Tools would include artificial intelligence and machine-learning to be able to filter out illegitimate websites with much better accuracy. 

Reference:

[1] A. M. Shabut, K. T. Lwin and M. A. Hossain, “Cyber attacks, countermeasures, and protection schemes — A state of the art survey,” 2016 10th International Conference on Software, Knowledge, Information Management & Applications (SKIMA), 2016, pp. 37-44, doi: 10.1109/SKIMA.2016.7916194.