Expanded Definition of Cloud

To: Prof. Jason Ellis

From: Muztahid Sakif

Date: October 27, 2021

Subject: Expanded Definition of Cloud

Introduction

The purpose of this document is to define and explore the context/history around the term Cloud. The term cloud is used very often in the networking industry. Although cloud computing began with the military for national security purposes, it’s now increasingly growing in other sectors like business, education, health, and public and private organizations. In this document, I will compare and contrast various definitions of the word cloud from different sources. Also, I will be discussing context around the word cloud. Meaning, how this term applies to the field of networking and the importance of cloud computing for different users. 

Definitions

According to Gale EBooks, “Cloud computing refers to the use of a network of remote servers to store files and perform services. The use of the term the cloud signifies that the network is as common as the clouds in the sky, indicating that the network is ubiquitous, easy to access, and readily available anywhere in the world” [1, p.1]. This is a great, easy-to-understand definition. The comparison of the term ‘cloud’ to ‘clouds’ shows the availability of Cloud in the modern world today. According to Britannica Academic, “Cloud computing, method of running application software and storing related data in central computer systems and providing customers or other users access to them through the Internet” [2, p.1]. The two definitions listed above are intended for different audiences. The first definition from Gale includes audiences that are outside of the computing field, whereas the definition from Britannica is more catered towards people in the computer science or related audiences. Both of these definitions include the concept of the exchanging and accessing data which is important to note. Data is a big component of the term cloud and the role of interacting with data through cloud is what makes it in demand in the current market today. The second definition is more specific as to how clouds are used in today’s world. The use of different software applications was not prevalent in the context of the original definition of cloud. 

Context

The following content expands on the usage of the word cloud in different contexts. According to the authors “Cloud solutions can improve the quality of smart city services, offering support to store, analyse, and extract knowledge from the raw data. The increasing need for supporting interaction between IoT and cloud computing systems has also led to the creation of the edge computing model, which aims to provide processing and storage capacity as an extension of available IoT devices without the need to move data or processing to a data center.” [3, p.2]. 

The use of the phrase “Cloud solutions” is important to note here. This phrase is often used in the context of the benefits of cloud, especially today. Improving the quality of smart city services through the cloud is very relevant, especially in New York City.  Also according to the authors, “Together with derived security data artifacts, this will support the Cloud provider community to implement a Security Manager system for a future Inter-Cloud environment and facilitate the adoption of these results in the private and public sector” [4, p.5]. In this context, the term cloud is mentioned in the context of security. With Cloud, there’s always the question of security which increases with time. This is also relevant to my field (Cyber Security) where the use of Cloud is increasing. 

Here’s a quote example from IEEE Xplore: Cloud Computing Based Social Media Model, writers K. Goel and I. Goel wrote about the role and the importance of cloud in the social media space: “So, to provide better data security, management,no worry of data management and also easy access of data will be required which can be only possible through cloud computing”[5, p.9]. The use of the word cloud here refers to its reach in various fields, including Social Media. The growth of Social Media is ever growing and the influence of cloud can provide its user with better security, management and allow business to grow through Social Media. Businesses, especially today, rely on Social Media advertising for business growth and cloud helps with large sums of data to simplify the process. 

Another quote example from the book Cloud Computing, writer Nayan Ruparelia wrote about cloud of things, which found in various ‘objects’ or technologies that we encounter “A cloud of things has inanimate objects, or things, as its scope; that is, it is a cloud that works with things instead of people or organizations. For example, you can have a cloud of public lighting— such as street or car park lighting— operated on a pay-per-use basis so that the lighting is available only to those who have paid for it and are in the vicinity” [6, p.10]. In this context, the author mentions the term “cloud of things” which is very relevant in the cloud business. Cloud of things can be an efficient way to manage lights as mentioned in the example. Meaning, the lights do not remain turned on all night and waste charge. The use of the term cloud refers to its influence on things instead of people or organizations. Cloud of things remotely monitor, manage and control the Internet of Things enabled devices like refrigerators, fire alarms, door locks, security systems, etc. 

Working Definition

Cloud is a networking/information technology infrastructure where all of organizations’ networking resources are shared in a public/private platform that is managed by a service provider. 

References

[1] Foyle, Harvey C. “Cloud Computing.” The SAGE Encyclopedia of Educational Technology, edited by J. Michael Spector, vol. 1, SAGE Reference, 2015, pp. 100-103. Gale eBooks, link.gale.com/apps/doc/CX6197800053/GVRL?u=cuny_nytc&sid=bookmark-GVRL&xid=8a12ab4f. Accessed 6 Oct. 2021

[2] Carr, Nicholas “Cloud Computing.” [Online]. Britannica Academic, Available: https://academic-eb-com.citytech.ezproxy.cuny.edu/levels/collegiate/article/cloud-computing/474374 [Accessed: 06-Oct-2021]. 

[3]. M. Fazio, R. Ranjan, M. Girolami, J. Taheri, S. Dustdar and M. Villari, “A Note on the Convergence of IoT, Edge, and Cloud Computing in Smart Cities,” in IEEE Cloud Computing, vol. 5, no. 5, pp. 22-24, Sep./Oct. 2018, doi: 10.1109/MCC.2018.053711663.

[4] M. Kretzschmar, M. Golling and S. Hanigk, “Security Management Areas in the Inter-cloud,” 2011 IEEE 4th International Conference on Cloud Computing, 2011, pp. 762-763, doi: 10.1109/CLOUD.2011.83.

[5]. K. Goel and I. Goel, “Cloud computing based social media model,” 2016 International Conference on Inventive Computation Technologies (ICICT), 2016, pp. 1-3, doi: 10.1109/INVENTIVE.2016.7823184.[6] Ruparelia, Nayan B.. Cloud Computing, MIT Press, 2016. ProQuest Ebook Central, https://ebookcentral.proquest.com/lib/citytech-ebooks/detail.action?docID=4527741.

500-word Summary of Article About Cyber Attacks

To: Prof.Ellis

From: Muztahid Sakif

Date: Oct. 6, 2021

Subject: 500-word Summary of Article About Cyber Attacks

The following 500-word summary of the article “Covid-19 Pandemic: A New Era of Cyber Security Threat and Holistic Approach to Overcome” by Jabber Ahmed highlights the increased threat of cyber-attacks during the Covid 19 pandemic. With countries across the world going into lockdown, the usage of computers and internet has increased significantly, making cyber criminals more active. The attacks are more prevalent with the lack of personal safety precautions in using the internet. Cyber criminals have found multiple ways to access data causing many banking, government, and non-government organizations to suffer cyber-attacks. This article focuses on safety precautions to protect personal and organization data from cyber criminals.

2020 was the year of pandemic that led to a “New Normal” by forcing many to work and learn from home. Cyber attackers are capitalizing off the pandemic by launching their cyber-attacks across the continents, especially in developing countries. Ahmed supports this using a bar graph which shows the percentage of attacks faced by the different continents. Europe faced 42% of the attacks, America faced 12%, Asia Pacific with 19%, Africa with 17% and the Middle East facing 10% of the attacks. Due to the lack of awareness in developing countries, many sites have been visited by people without security precautions.

Ahmed mentions specific sectors that were attacked during the pandemic including, healthcare and medical sectors, financial sectors, and educational sectors. With the health care system already weakened by the pandemic, attacks saw this sector as the ideal place to attack. With the increase of the remote care system, the hackers were active in getting to the healthcare system around the world. Financial sectors have suffered the attacks with the increased use of online support. Most employees were working from home with an unsecured network which exposed them to attacks. Educational sectors were also affected with students from all levels being dependent on e-learning with the use of independent applications like Zoom which was vulnerable to malware attacks. 

Common types of cyber-attack include DDoS Attack, phishing, malware, and ransomware. DDoS attacks are used to make an online service unavailable for the user by increasing traffic. According to the author, “ In the first quarter of the year 2020, the total number of reported DDoS attacks was 242, and in the second quarter, the number was increased to 300 [12] [13]” [1, p. 14]. Phishing hackers send emails to individuals with fake web pages that can capture details of an individual. Attacks spread malware in devices of the users during the pandemic. Malware can create a “backdoor” in the user’s device, allowing criminals to take all personal credentials/ passwords. 

Ahmed highlights some ways of preventing these attacks. Ransomware can be prevented with an Updated OS that provides an updated patch file for prevention. To prevent DDos Attacks, users can keep the firewall on which can detect the source of IP address range to control the overflow. Phishing attacks can be prevented by having adequate knowledge of phishing emails, not clicking phishing links, and not providing credentials to unsecured websites.

Reference: [1] J. Ahmed and Q. Tushar, “Covid-19 Pandemic: A New Era Of Cyber Security Threat And Holistic Approach To Overcome,” 2020 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE), 2020, pp. 1-5, doi: 10.1109/CSDE50874.2020.9411533.