500 Word Summary of new COVID-19 Drug

To: Professor Ellis

From: Ducquon Hinds 

Date: December 21, 2021

Subject: 500 Word Summary of new COVID-19 Drug 

This is a 500-word summary of an article that Explains the vivid research of a prominent virologist who believes the Newly accepted oral COVID-19 drug may create Dangerous Mutations that can produce deadlier variants of the coronavirus. 

[1] The UK’s approval of the first Oral COVID-19 drug Molnupiravir (An antiviral Medication that inhibits the replication of certain RNA viruses and is used to treat COVID-19) comes as a virologist warned that the drug could inadvertently cause new versions of COVID-19 to emerge more prominent in patients who are already at high risk with underlying severe diseases and can potentially be doing more harm than any good. While on the other hand, other virologists believe it wouldn’t be plausible to withhold a drug that can save lives to investigate research that may not be a cause for concern.

[2] developed from an early antiviral drug by Merck and ridgeback Biotherapeutics, Molnupiravir works by disrupting the viral replication cycle by introducing many mutations to the virus’s DNA. Last month, officials from Merck and Ridgeback published clinical trial results showing that administering the drug to patients with early-stage COVID-19 reduces the risk of hospitalization and death by 50%. The drug’s ability to mutate RNA has raised persistent concerns that it could cause cancer or birth defects by causing mutations in patients’ own genetic material. Studies have not yet confirmed these concerns. 

[3] William Haseltine, a virologist previously known for his research on the HIV and human DNA project at Harvard University, warned that the use of molnupiravir, which is known to induce viral mutations, could lead to the development of new harmful variants that could be more dangerous than the ones present today. 

[4] Since many people who take antibiotics fail to complete their treatment, if a COVID-19 patient feels better after a few days Haseltine fears that the Mutant virus may survive and spread if they stop taking molnupiravir.

[5] Although infectious disease experts agree that the possibility of generating variants is there, they do not believe that this will have a negative effect on the virus.

[6] Haseltine’s Studies that show that coronaviruses can survive the effects of molnupiravir-induced mutations are important because they suggest that the viruses can still evolve and become drug-resistant. for example, two years ago Vanderbuilt University virologist Mark Denison and colleagues repeatedly exposed coronaviruses to a sublethal dose of a drug called EIDD1931 to test the drug-resistant viruses (murine hepatitis virus and a virus that causes respiratory syndrome in the Middle East) 30 rounds of such drug treatment caused up to 162 different mutations that the virus did not kill. However, Denison states that his study does not catalog mutations in individual viruses, instead up to 162 Mutations occurred in a population of cells infected with one of the two coronaviruses.  

[7] Most Mutations damaged the virus and slowed its growth. Most mutations damaged the virus and slowed its growth. “When I take something away from my job, the virus continues to develop harmful mutations when it tries to adapt, for example by resistance to [Molnupiravir],” Denison says. However, Ravindra Gupta, a microbiologist at the University of Cambridge, warns that the mutant virus is more likely to propagate in people who are most likely to take Molnupiravir, that is, those with a weakened immune system. “These are exactly the people most likely to receive [Molnupiravir],” he says because vaccines are less effective in protecting these patients.

[8] Daria Hazda, director of infectious disease detection at Merck, said “there is no evidence that people taking Molnupiravir were creating a virus with a new and dangerous Mutation. “No infectious virus was found,” says Hazda. She also states that patients who have been treated with the drug for 5 days. Mutations that occurred along the way were Random and did not focus on specific genes that increase the survival of the Virus.

[9] “There is no shortage of virus Mutations,” says Katzourakis. A more important question is whether molnupiravir exerts selective pressure to drive the virus towards infectivity or pathogenicity. A more important question is whether molnupiravir exerts selective pressure to drive the virus towards infectivity or pathogenicity.

[10] According to Denison and other virologists, Molnupiravir is likely to promote the emergence of drug-resistant viruses that are no longer fatal or contagious, a common consequence of anti-infective drugs. However, in the news, November on 5th News that another Pfizer antiviral drug was very effective against COVID-19 suggests ways to prevent resistance. 

Reference:R. F. Service, “A prominent virologist warns COVID-19 pill could unleash dangerous mutants. Others see little cause for alarm,” Goldtent TA Paradise ” A Prominent Virologist Warns COVID Pill Could Unleash Dangerous Mutants. Others See Little Cause for Alarm, 07-Nov-2021. [Online]. Available: https://goldtadise.com/?p=516074. [Accessed: 21-Dec-2021]. 

500 Word Summary

To: Professor Ellis
From Kiara Ortiz
Date: September 28, 2021
Subject: 500 -Word Summary of Article

1. The following writing is about a 500-word summary of scholarly article on how network slicing can be secured when dividing a network up to increase privacy in a 5G network. The technology used to make this a reality is called blockchain. So, with the help of blockchain the authors are proposing a means by which to preserve privacy when slicing up a network for greater performance. With this methodology performance won’t come at the cost of privacy.
2. Network slicing is vital to the 5G standard. The purpose of slicing up a network is to divide up the physical channel (physical frequencies) in space. These divisions become isolated and support the 5G services with a diverse set of performance and service requirements. This slicing paradigm is used to maintain high capacity (greater volume of customers served), lower latency (quicker responses from the internet), and other large-scale services. Many companies are trying to set up infrastructure in 5G and they must meet the requirements to capture the greatest number of customers.
3. 5G services providers must meet a quality standard when deploying a service, this quality standard is called Quality of Service (QoS). Depending on the implantation and type of 5G network there are issues with rollout. One such issue is that in the US majority of rollout has been in the low band 5G which shows a subpar speed increase. Incapable of meeting the needs of US consumers. While in South Korea the 5G infrastructure is incapable enough to maintain a good enough QoS.
4. As a result of these issue and as mentioned earlier, there must be a standard that upkeeps the expectations of consumers. Hence why the service level agreement of network slicing exists, this agreement is proposed to address some the issues aforementioned. The parameters change depending on the customer and network operator, some parameters include secrecy rate, latency, packet loss, and so on.
5. Given this structure of standards monitoring and auditing seems to be an issue as well. Many Cloud platforms, domains, and third-party auditors have been tampering with reports for their own benefits. On the other hand, multi-party monitoring schemes can address these issues, but it is still difficult to trust relationship between a select few parties as a result authenticity of data cannot be guaranteed.
6. Key word here is trust, the most trustful platform/technology that has been discussed in recent memory is Blockchain. So, in this paper the proposal is to use blockchain as a technique to do SLA monitoring and auditing. The paper also notes that privacy leaking may also be a challenge in this paradigm.
7. It is noted that SLA management of 5G network slicing service is at in infancy, and there is much research done in this field yet.
8. The proposal in short is, a blockchain-based 5G network slicing NS-SLA audit model to prevent eavesdroppers. Both costumers and network operators will be involved in monitoring the task of 5G network slicing service and upload the monitored data to the blockchain. This uploading and auditing will be facilitated by a smart contract.
References:

Xiao, K., Geng, Z., He, Y., Xu, G., Wang, C., & Tian, Y. (2021). A blockchain-based privacy-preserving 5G network slicing service level agreement audit scheme. EURASIP Journal on Wireless Communications & Networking, 2021(1), 1–16. https://doi-org.citytech.ezproxy.cuny.edu/10.1186/s13638-021-02037-8

500 Word Summary

TO: Prof. Ellis
FROM: Rosario Garcia
DATE: 12/10/2021
SUBJECT: 500-Word Summary of Pandemic Parallels: What Can Cybersecurity Learn From COVID-19?

The purpose of this summary is to discuss the issues that the happen during the pandemic. How cybersecurity is important to learn about now in time during the pandemic everyone have been in remote using more technology. It mentions the pandemic there was different challenges since everyone needs find ways to use cybersecurity and protect our technology from cybersecurity threats.  “With COVID-19, there is still uncertainty about the efficacy of certain countermeasures or treatments, while in cybersecurity, some still insist that safeguards, such as antivirus software, do more to degrade the system performance than they do to protect.”[page 2 paragraph 9] It compares both how cybersecurity and COVID-19 they are virus, how they can change over time we need to figure out ways to protect from the covid-19. Learn how to safeguards the technology and how to understand the basic like strong passwords and use anti-virus software. It important to build knowledge more about cybersecurity learn how it protect learn how it works. It important that the people understand the need to know about cybersecurity learning way to protect your privacy and information online.  “Similarly, basic cybersecurity safeguards (for example, using antivirus software and strong passwords and not clicking on suspicious attachments) apply across numerous systems and services but also vary depending on the context (for example, work versus home).” [page 2 paragraph 4] It very information to continue stay up to date on the latest software and on top change password recommend every 3 months but need to have double authorization better to notify the user verification it them login and not anyone else. Cybersecurity mean is to learn how to protect your privacy but also information yourself more protecting you on the internet. How to inform yourself from the cybersecurity also figure out ways to prevent any threat from you. “The pandemic has demonstrated that messaging should be part of a framework of protections. However, that wider framework must be ready to handle the result of effective messaging.” [page 4 paragraph 22] “Given the parallels, cybersecurity can learn valuable lessons from the COVID-19 messaging response. One could argue that we’ve seen more effective large-scale messaging and enforcement of safeguards with COVID-19 precisely because it poses a greater risk.” [page 4 paragraph 25] Even though the situation that we are in is bad situation it happens that we should take it as learning lesson. Even though we can recover though the pandemic and cyberattacks there just something that permanent can’t be undo, it makes to continue put guards up and stay safe. Follow the methods or steps to prevents getting sick or the spread the covid-19, for cybersecurity is to stay o top the update and keep devices and technology safe from virus-free by only trusting secured sites.

References:
[1] Furnell; Steven, et al. “Pandemic Parallels: What Can Cybersecurity Learn from Covid-19?” IEEE Xplore, IEEE, 15 Mar. 2021, https://ieeexplore.ieee.org/document/9378909.

500 – Word’s how escalators change our sense of space forever

TO: Prof. Ellis
FROM: Olamide Yomi
DATE: Sep 20, 2021,
SUBJECT: 500 – Word’s how escalators change our sense of space forever

The following is a 500-word or close to 500-word summary of a peer-reviewed article that describes computer science and the importance of teaching computer science in methodology method to help students get a wide view of computer science. This will give students more zest in every course they take. According to the author of the article with teaching computer in a methodology method “guide students to understand computer science from a higher perspective and learn computer science through the methodology of subject and educate students to face the future.” [1, p. 293].

The introduction of computer science and technology help provide students with the understanding of computer science major, by which setting a stage for students to think about computer science course more deeply. There are two types of computers and technology arrangement. One is the general understanding of soft and hardware and mastering the utilization of the operating system and office software, the other is also comparable to the methodology of computer science and technology trying to understand deeply its basic sequence.

College basics teach computer from implementation limiting student perspective of the computer science. Unlike methodology of computer science and technology dive deeper into the cognition of nature of computer science and the main field and essential character of computer science.

The researcher hopes to get a new perspective of the “methodology of the subject” and introduce core conception, essential question, typical teaching method, and knowledge system. They also trust that students would understand the higher perspective and learn it through the methodology of the subject and educate to face the future. In this article Educationalist B. A Cyxomjnhcknn says “learning interests are the important part of learning activities” [2, p. 293].  interest in computer course itself is what attracts students and scared them at first. The cultivation of the student’s interest is the top consideration for all teachers. Teachers must lead students into learning it.

Core technologies and core concepts will help students understand the strategies of learning computer science. Algorithms describe the process of solving a problem and taking limited procedures in solving it. Students would be to learn about algorithms both emotionally and rationally make a description in form.

According to students’ questionnaires, 88 percent wish they can apply the skill to using the software after they finish their course. Teachers have the responsibility to constructing works so students can study themselves and their practical abilities through task-driven mode.

the main content of the theoretical part is the introduction of computer hardware and software systems; the scientific problem has three discipline forms and the core concepts. Typical mathematical method and system and system science. Students thought of enlightened through the proportional variation-seeking algorithm, the mathematical method for problem-solving and this make them realized the leading character of mathematics in computing discipline and guidelines of subject methodology. This improves their curiosity and their thirst for knowledge can be inspired. Strong practical characteristics will be able to demonstrate to students when they get on a computer, they can watch and simultaneously operate.

Every teacher has a concept about the methodology of computer science and technology. The teaching

Schools should adopt different means of teaching students different means to teach content. The most important is to implement research-oriented teaching in the classroom.

[1]          Fu Hefang and Li Zhaoxia, “Research and discussion on Introduction to Computer Science and Technology teaching based on methodology,” 2010 2nd International Conference on Education pp. 293-295 Technology and Computer, 2010, https://doi: 10.1109/ICETC.2010.5529680.

500-Word Summary Of Article About Unikernel Security

TO: Prof. Ellis
FROM: Edwin Baez
DATE: October 6th, 2021
SUBJECT: 500-Word Summary Of Article About Unikernel Security

The following 500-word summary of an Article about Unikernel Security. The author discusses the risks and benefits of running applications on Unikernel environments. By showing many diagrams and going in-depth on what each type of kernel does and allows, we can differentiate which kernels are right for us.

The Kernel is the essential center of a computer’s Operating System. It is basically the core that provides basic services for all other parts of the OS. Modern-day applications require cloud services to run in a Kernel environment, making it vulnerable to attacks. A unikernel is a specialized, single address space machine image constructed using the developer’s minimal set of a selection of services. With Unikernel environments, attacks are less likely due to the lightweight memory footprint and self-contained environment.

Virtualization is the process of mirroring or emulating a system using the resources of a host machine. It can be used to re-create networks or emulate a whole new machine, thus making it more secure to use. Virtual Machines cannot communicate with each other, so if one is ever infiltrated then no harm will be caused to the actual host machine. In other words, you can use your computer to run a virtual computer and whatever happens to that virtual computer will have no effect on your actual computer/hardware.

There are various types of Virtualization. The first is Full-Virtualization, which aliases the hardware the guest machine runs on. The main appeal is its ability to mirror hardware, making it more reliable, provides more consistent performance, and is able to isolate in case of a malicious attack. If a cyber-attack were to happen, the attacker cannot attack the host but can eventually see that It is attacking a virtual machine. The second type of virtualization is OS-Virtualization. OSV is ran on a single kernel but it runs many operating systems at once. It’s basically many containers and each holding its own operating system. These containers don’t have access to the hardware of the physical machine so it is limited to the OS of the host. With that said, If the machine was ever to get attacked, all containers will be compromised.

There are two types of unikernels whose security profiles differ. Clean Slate Unikernels are not emulators. They are written in a single programming language whether it’s C++, HalVM, or Javascript. They also allow language-specific virtual machines to function, for example, Java Virtual Machine (JVM). Legacy Unikernels, on the other hand, implement a subset to ensure unmodified software can run while only requiring minor configurations. According to J. Talbot et al, “They don’t support timesharing (the ability to simultaneously run multiple independent programs), instead, they delegate this role to the virtualization layer” [1, p.2].

Isolation is the main goal of most, if not all, security enthusiasts. Software running on a Unikernel is more isolated than software running in a container. This is due to the fact that unikernels are singular and have a reduced attack surface.

REFERENCE

[1] J. Talbot et al., “A Security Perspective on Unikernels,” 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), 2020, pp. 1-7, doi: 10.1109/CyberSecurity49315.2020.9138883.

500-Word Summary of Computer Science Education

To: Prof. Ellis

From: Michael Vanunu

Date: Sept. 21, 2021

Subject: 500-Word Summary of Computer Science Education

Computer science and technology have been developing well over time, this has instantiated multiple computer science courses. These courses can lead to problems which a new student wouldn’t be able to obtain reasonably. This will lead to future problems without assistance of people with more experience and knowledge on the subject.

More systems were developed to solve the problem. People like Chanyan Nuntwawong, Karim Hadjar, Antonio Maffei, and others have tried to fix the problem by presenting their ideas throughout the years.

The paper explains how a computer course can help fresh learners explore reasonable and appropriate curriculums.

The design of OSCCA has five basic steps, “Including data collection, data preprocessing, construction Ontology, establishing reasonable rules and implementing the system” [1, Sect. II]. For the first part, knowledge and unit’s points are being collected from the data that includes courses and universities as well as the likes of those places and locations to provide the best data possible. The second step is a very crucial one. The raw data is going to be processed into NLP, which stands for, Natural language processing. This is going to be a very rough processes that uses Apriori algorithm and things alike. The third step will include the interrelationships of the data collected that will be applied to an ontology. The fourth step defines the four reasoning rules that are important to the whole thing. The fifth and final step is to build a website using java that can provide great and available services for people who are new to learning computer science.

Datasets for the course are being collected through internet information as well as college curriculums. A python spider package named scrappy is used to fetch information for the course. “The course datasets consist of courses, units and knowledge points” [2, Sect. III]. These are the points that “Scrapy” fetches to make the best possible outcome for new students trying to learn.

The analysis and the terms of relationships are analyzed by how each item will be defined. NLP is used to detect and extract the best and contributed items. The Apriori algorithm is used in here again. Apriori algorithm will be solving the frequent items as well as the set problems to assist databases.

Computer courses are increasing at a rapid pace. The courses provided by many courses are independent. Newer learners of the computer science field might be confused by a lot of unneeded and unnecessary information. The solution to the problem is the course for OSCCA (a course ontology stem for computer science education is developed).

Y. Wang, Z. Wang, X. Hu, T. Bai, S. Yang and L. Huang, “A Courses Ontology System for Computer Science Education,” 2019 IEEE International Conference on Computer Science and Educational Informatization (CSEI), 2019, pp. 251-254, doi: 10.1109/CSEI47661.2019.8938930.

500-Word Summary of Article About Smart Home And Smart Home Automation Using IoT

TO:       Prof. Ellis
FROM:     Jared Williams
DATE:     Oct. 6, 2021
SUBJECT:  500-Word Summary of Article About Smart Home and Home Automation Using IoT.

               The following is a 500-word summary of an article about the performance of wireless smart home automation using the Internet of Things (IoT). The authors discuss energy consumption around the world setting new records due to the increasing scope of technology. As energy consumption rises, new ways to lower it are being developed. Smart homes and smart home technology can reduce energy consumption and save people money.

               A principal feature of smart home technology is its simplicity, which is something the authors wanted to retain for their project. Agarwal et al. state, “We designed a home automation system using the concept of internet of things (IOT) enabling us to automate basic home functionalities like switching on/off Equipment lights, cooling systems, refrigerators and other home appliances that are operational in homes” [1, p. 630]. The authors discuss a Bluetooth based automation system and a GSM based automation system facilitated through a cell phone. The many ways a GSM based automation system can be used is briefly touched on.

               The authors wanted to remotely control their appliance through the use of a Wi-Fi connection. A html page was created in order to control their appliance for the test. Pseudocode for the project is provided to give a brief understanding of the goal. The authors use a device called an optocoupler, which – depending on their input – completes the circuit transmitting infrared light to a light-sensitive diode that powers on a lightbulb. The authors are using an Arduino device outfitted with Wi-fi capabilities and Bluetooth for their test.

               The steps to achieve the desired outcome are expanded upon from the previously stated pseudocode: The Arduino powers on and attempts to connect to Wi-Fi. If it can’t connect, the Arduino will continue to try until a connection is successful. Once connection is established, it will then await a command. When it receives an “on” or “off” command, the device sends a signal to the opto-coupler to complete the circuit or to break the current. The range of Bluetooth is very limited, which makes Wi-Fi based home automation more appealing as you can control appliances from wherever you have access to the internet. The Arduinos Wi-Fi module allowed for wireless control over the local network.

               The purpose of the project was to demonstrate the quality-of-life benefits from using smart home automation and show its potential in reducing power consumption. While smart homes can enhance our quality of life, one major concern is security. You must make sure all security and privacy precautions are taken when implementing the technology. Neglecting the security aspect of smart home technology can leave you vulnerable to attack and a potential invasion of privacy.

Reference

[1]        K. Agarwal, A. Agarwal, and G. Misra, “Review and Performance Analysis on Wireless Smart Home and Home Automation using IoT,” 2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2019, pp. 629-633, doi: 10.1109/I-SMAC47947.2019.9032629.

500-word summary on Persistent URLs and Citations

TO: Prof. Ellis

FROM: Alex Cheung

DATE: Oct. 6, 2021

SUBJECT: 500-Word Summary of Article About Persistent URLs and Citations

Persistent URLs and Citations are one of the most important elements of an article, scholarly paper, or any academic writing. These persistent URLs provide a link to a full-text article that will never change thus always linking to the article that is a part of a database or journal. Without them, it might be hard to find that specific full-text article later down the road and. Nicholas Homenda believes that persistent URLs and citations are a necessity as evident by his thought, “As libraries, archives, and museums make unique digital collections openly available via digital library platforms, they expose these resources to users who may wish to cite them” [1, p. 1].

There are four main methods used for persistent URLs that include: Handle, DOI, ARK, and PURL. As libraries, archives, and museums move more of their collections to digital mediums, having a persistent URL to access these materials are essential to find the said material which is part of certain collections [1, p. 1]. Most of these persistent URL services have been around since the 1990s to the early 2000s [1, p. 2]. Each site uses their own version of persistent URLs thus resulting in many different types of links. This calls for more standards for persistent URLs.

There is a term called “link rot” which means that overtime the link will eventually not point to the page or file that it was meant to point to. There have been several studies done on link rot by tracking the availability of the resource over time [1, p. 3]. In recent works by Koster, he mentions that the persistent URL method that appears the most often in literature is the Digital Object Identifier (DOI) [1, p. 4]. 

For over 20 years, persistent URLs have been providing persistent links to digital objects allowing users worldwide to access the content [1, p. 4]. Persistent URLs are even used to create permanent links to government information. This was an early effort by the Cendi Persistent Identification Task Group to implement the Federal Enterprise Architecture (FEA) and a theoretical Federal Persistent Identification Resolver [1, p. 4].

All persistent links should ideally be accessible via URLs that will outlast the information that it is linking to unless that link is subjected to “link rot” [1, p. 4]. In one investigation into “link rot” on information from Medline abstracts from the years 1994-2006, shows that about 20% of the links were dead in 2008. The topic of “link rot” has been discussed as early as 2003 in a book by Markwell and Brooke named ““Broken Links: Just How Rapidly Do Science Education Hyperlinks Go Extinct”, which is cited by many link rot studies but it looks like this too has suffered from link rot in works that cited this book [1, p.4]. 

In a recent study, they tried to locate digital collections that met the following criteria:

  1. Openly available
  2. Part of a repository service
  3. Gathered as part of a site or service that contains multiple collections
  4. Unique to an institution but not duplicated or licensed content

With these criteria in place, it helps to find unique and publicly available digital collections [1, p. 5]. The study found that the DLF institution had 171 out of 197 member institutions that had accessible digital collections, while only 153 out of the 171 met the criteria for this study [1, p. 6]. 

Reference

[1] Homenda, N. (2021) ‘Persistent URLs and Citations Offered for Digital Objects by Digital Libraries’, Information Technology & Libraries, 40(2), pp. 1–12. doi: 10.6017/ital.v40i2.12987.

500-word summary on Cyber-attacks and Countermeasures

From: Anthony Cuomo
Date: 10/6/2021
Subject: 500-word summary on Cyber-attacks and Countermeasures. 

Cyber-attacks are becoming more frequent and sophisticated due to human error, which are not being accounted for properly by current cyber security protocols. There are three main types of protection tools that are being used in the fight against cybercrimes such as, blacklisting, heuristics, and a hybrid of the two techniques. Cyber protection tools are not fool proof, and users need to learn how to identify a potential attack and how to identify what measures to take to prevent said attack by learning cyber-attack taxonomy and classifications. [1, p. 37]

The author argues that this article is trying to contribute to the advancement of helping users identify and assess potential cyber security threats online. Cyber-attacks are a type of attack that targets the users’ vulnerabilities, these attacks including phishing, drive-by downloads, and social engineering. There are technical and non-technical tools that are being used to help fight against cybercrimes. One of the non-technical tools being implemented is the legislative tool which passes laws against illegal cyber activities. Another non-technical tool that is being used is training and education tools, one of the tools being used is the Cybersecurity Nexus by ISACA.  

Anti-virus software is the most common approach in dealing with cyber security threats, but as the threats get more sophisticated, it could take upwards of hundreds of days before the software can provide adequate protection from a new attack. According to the author, “It is important to educate users, to improve awareness of threats, risks, and what security warnings are about”. More measures need to be taken to help educate people on potential risks. In the meantime, there are web browser filters that utilize the blacklisting technique which compares the requested web page with a database of currently known fake web pages, but this method comes with a drawback of having to constantly update and maintain an increasingly large amount of fake web pages. Google uses a tool called safe browsing, that has two flaws in which users can potentially be tracked and websites will not get filtered if users do not synchronize their accounts.


Mozilla Thunderbird and Internet Explorer use a protection tool called CANTINA which uses the heuristic technique, the drawback to this is the protection will sometimes block legitimate sites and label them fraudulent. Fuzzy data mining technique is heuristic based and tries to determine the legitimacy of websites through associating the pages URL and domain identity. The Neuro-Fuzzy model attempts to decide a webpage legitimacy by going through a list of five inputs that would make it possible to determine the legitimacy in real time. There are three protections tools called Anti-phishing Phil, CyberCIEGE and BigAmbition, which the goal is to help educate users and increase awareness in potential cyber security risks. Smart Protection Tools would include artificial intelligence and machine-learning to be able to filter out illegitimate websites with much better accuracy. 

Reference:

[1] A. M. Shabut, K. T. Lwin and M. A. Hossain, “Cyber attacks, countermeasures, and protection schemes — A state of the art survey,” 2016 10th International Conference on Software, Knowledge, Information Management & Applications (SKIMA), 2016, pp. 37-44, doi: 10.1109/SKIMA.2016.7916194.