To: Prof. Ellis

From: Anthony Cuomo

Date: 10/27/2021

Subject: Expanded Term Definition of Secure

Introduction

The purpose of this document is to teach the reader the differences between the different definitions of the word secure. A brief example of two different definitions will be shared, along with the history, etymology and some quotes from articles that I feel encapsulates the definitions best.

Definition

“Who hath oftner waged warres then he? Escapes secure him not: he owes the price [1].” This quote from “The misfortunes of Arthur” by playwright Thomas Hughes in 1587 was the first known usage of the term secure. From reading the sentence and using context clues, we can infer that the definition of secure in 1587 was the same definition used in modern language. To secure most commonly means to keep safe from danger or harm. This is not the only definition of secure that has been seen throughout the years though. Like a lot of words in the English language, secure has multiple meanings depending on the context that the word is being used. 

Context

The word secure is derived from the Latin word “securare”, which means to keep safe from harm [1]. This will probably be the first definition you will see when searching for the word secure in today’s day and age. To keep safe from danger or harm. As in to secure personal information or even to secure a space for a person to access safely. When speaking of securing something, JD Stahl had this to say about Elizabeth Enright’s writing style “She is not naive about the terrors and sufferings of children; she merely chooses to place the joyful and secure features of children’s lives in the foreground [2].” Elizabeth Enright, according to Stahl, uses a writing style which places the positive or “Secure” aspects of their lives into the forefront of the setting. A good way to think about the term secure is that it is not always used as a verb, but you can use it as an adjective to describe something. 

The English language is interesting in the way that a single word could have more than 1 meaning. Another popular definition you could see for the word secure is to make sure something is obtained. Here is a quote from a New York Times article by Julia Preston and Fernanda Santos about how Latinos gained influence in a national election. “Latinos turned out in record numbers on Tuesday and voted for President Obama by broad margins, tipping the balance in at least three swing states and securing their position as an organized force in American politics with the power to move national elections [3].” As we can see with this quote, the authors are not talking about how something is safe or out of harm’s way but instead uses secure as a way to show how Latinos were able to obtain something. In the cast that Julia Preston and Fernanda Santos showed, the thing that was obtained was political influence and power.

Working Definition

The term secure has a lot of uses when it comes to computer security. Anything that is done on a computer on a public domain is going to have some sort of security protecting it. Programmers and cyber security experts use the term secure all the time. One that is seen and heard often is to make sure your network is secure. This means that you should make sure that the network that you are working on is safe from harm from potential cyber-attacks or breaches. Cyber security can also use the other definition of secure that has been described, which is to make sure something is obtained. For example, securing a connection to a VPN. The thing being secured, or obtained, here is the connection from the user to the VPN servers. A VPN is a tool that is used to hide your IP address and is used to encrypt any type of data that would be sent via the internet [4].

References:

[1] “secure, v.” OED Online, Oxford University Press, September 2021, 

www.oed.com/view/Entry/174648. Accessed 16 October 2021

[2] Stahl, J.D. “A secure world of childhood: the artistry of Elizabeth Enright.” Hollins Critic, vol. 35, no. 2, Apr. 1998, pp. 1+. Gale Literature Resource Center, link.gale.com/apps/doc/A130929968/GLS?u=cuny_nytc&sid=bookmark-GLS&xid=1fb2d005. Accessed 15 Oct. 2021. 

[3] J. Preston and F. Santos, “A record Latino turnout, solidly backing obama,” The New York Times, 08-Nov-2012. [Online]. Available: https://www.nytimes.com/2012/11/08/us/politics/with-record-turnout-latinos-solidly-back-obama-and-wield-influence.html. [Accessed: 16-Oct-2021].  

[4] “What is a VPN? virtual private network benefits,” NordVPN, 10-Nov-2021. [Online]. Available: https://nordvpn.com/what-is-a-vpn/. [Accessed: 11-Nov-2021].

[5] “Secure,” Merriam-Webster. [Online]. Available: https://www.merriam-webster.com/dictionary/secure. [Accessed: 16-Oct-2021].  

Expanded Definition of Distributed Denial of Service

TO: Prof. Ellis

FROM: Alex Cheung

DATE: Oct. 27, 2021

SUBJECT: Expanded Definition of Distributed Denial of Service Attacks, First Half, Rough Draft

Introduction

The purpose of this document is to better our understanding and knowledge about the term Denial of Service Attacks. We will be discussing the history, context, and the different types of Denial of Service Attacks. Denial of Service Attacks is a very known term amongst network security professionals and black hat hackers. 

Definitions

According to the Oxford English Dictionary, the term Distributed Denial of Service means “Computing a form of denial of service in which a web server or other computer system is maliciously overwhelmed by spurious requests from many computers in different locations on the internet, in order to make it inaccessible or unusable” [1]. This definition does a great job of explaining what a Distributed Denial of Service Attack is but, it does not mention how it utilizes malware to add infected computers to its botnet. According to the Britannica Academic, the term Denial of Service means “type of cybercrime in which an Internet site is made unavailable, typically by using multiple computers to repeatedly make requests that tie up the site and prevent it from responding to requests from legitimate users” [2]. Britannica Academic also says that “Distributed DoS (DDoS) attacks are a special kind of hacking. A criminal salts an array of computers with computer programs that can be triggered by an external computer user. These programs are known as Trojan horses since they enter the unknowing users’ computers as something benign, such as a photo or document attached to an e-mail” [2]. Both of these definitions from Britannica Academic do a great job of explaining the definition of a Distributed Denial of Service. It explains clearly that a malware known as a trojan is required to infect other computers and can then be controlled by an external computer and is used for criminal activities.

Context

For anyone who isn’t familiar with network security or other related fields, the term Denial of Service might just mean refusing to serve someone. But to someone who is in the said related fields, Denial of Service is a cybercrime that aims to disrupt service that lives on the internet, like websites, servers, and others. The earliest use of the term Disrupted Denial of Service according to the Oxford English Dictionary is in 1998 in a report about a DDoS attack against NIS / NIS+ based networks [1]. The term Distributed Denial of Service really only has one meaning.

In a New York Times article titled “Hackers Used New Weapons to Disrupt Major Websites Across U.S.”, author Nicole Perlroth talks about how disruptive a DDoS attack can be by citing Dr. Simons: “A DDoS attack could certainly impact these votes and make a big difference in swing states” [3]. The use of the term Disrupted Denial of Service here refers to how harmful DDoS attacks can be to critical processes like the U.S. presidential election if votes were transferred through the internet. A Distributed Denial of Service attack can take down many essential systems that are needed by many people and businesses like Amazon Web Services which hosts many of the websites used by people and businesses for day to day operations and it would be catastrophic if those services were taken down by an attack.

In an article by Imperva, a cyber security software and services company, titled “DDoS Attacks”, talks about DDoS attacks, how an attack can flood a service with malicious traffic, and the types of DDoS attacks. In the article it says “DDoS attacks are quickly becoming the most prevalent type of cyber threat, growing rapidly in the past year in both number and volume according to recent market research” [4]. The use of the term Disrupted Denial of Service here refers to the many different types of DDoS attacks used to take down a site or service. Some of the different DDoS attack types mentioned are: UDP Flood, ICMP Flood, SYN Flood, Ping of Death, Slowloris, NTP Amplification, HTTP Flood, and Zero-day. Each type of attack uses a different method to reach the goal of denying service. For example, a UDP Flood floods a victim server’s ports with UDP packets which uses up all the server’s resources which can slow down the server or even cause it to eventually become unreachable by others.

DDoS attacks are a huge problem in today’s internet. Almost anyone can perform a DDoS attack because of online “booter” services which allow users to pay a subscription to access their botnet to perform the malicious attacks on their unsuspecting victims. This is why many companies spend thousands or even millions of dollars trying to mitigate these attacks to keep their vital services online for their consumers.

Working Definition

Based on the definitions and word history discussed, I would define the term Distributed Denial of Service as: A cybercrime that aims to disrupt internet services like websites and servers by utilizing computers (victims) infected with a trojan which allows the black hat hacker to control the victim’s computer and be used for a massive Denial of Service Attack to take down or disrupt services. 

References

[1] “distributed denial of service, n.”. OED Online. September 2021. Oxford University Press. https://www-oed-com.citytech.ezproxy.cuny.edu/view/Entry/55777#eid233469643 (accessed October 08, 2021).

[2] “Denial of service attack (DoS attack).” Britannica Academic, Encyclopædia Britannica, 2 Feb. 2018. https://academic-eb-com.citytech.ezproxy.cuny.edu/levels/collegiate/article/denial-of-service-attack/471037. Accessed 8 Oct. 2021.

[3] N. Perlroth, “Hackers used new weapons to disrupt major websites across U.S.,” The New York Times, 21-Oct-2016. [Online]. Available: https://www.nytimes.com/2016/10/22/business/internet-problems-attack.html. [Accessed: 18-Oct-2021].

[4] “DDoS attack types & mitigation methods: Imperva,” Imperva, 14-Feb-2021. [Online]. Available: https://www.imperva.com/learn/ddos/ddos-attacks/. [Accessed: 31-Oct-2021].

Expanded Definition of Sandbox

TO:               Prof. Jason Ellis
FROM:         Edwin Baez
DATE:          10/27/2021
SUBJECT:    Expanded Definition of Sandbox

Introduction 

 The purpose of this document is to explore the meaning and history of the term Sandbox. The term sandbox is used often in the software testing world, just as it was used pre-machines to define a play area. In this document, I will compare and contrast various definitions of the word Sandbox and how they are used in our world today.

Definitions 

The definition of Sandbox found in the Merriam-Webster dictionary is “a box or receptacle containing loose sand”[1,p1]. This is, of course, the old yet still relevant definition. Sandboxes are basically playpens for kids to let their imaginations run wild, but the term has long progressed since those days. According to the same Merriam-Webster dictionary, “a controller environment supervised by a regulatory authority within which existing regulations are relaxed or removed to allow businesses to more freely experiment with new products and services”[1, p1]. This definition is referring to the business use of the word, stating how a Sandbox is an environment that is controlled and supervised to test new products and services. For example, a business like Apple needs to test out its HTML code to see if those flashy new images look good on their website without bringing down their website. For experiments and test features like that, they use a Sandbox environment. Furthermore, there is a cyber security aspect to the definition. According to an article written on ProofPoint, “The purpose of the sandbox is to execute malicious code and analyze it.”[3,p1]. This definition shows how cyber security specialists use a sandbox as a tool to run code and decipher whether they are malicious or create any type of vulnerability in a system.

Context 

Though used in different manners, the term Sandbox essentially comes to a general meaning of testing with low risk. An author writes, “the idea of a sandbox provides an apt metaphor for the type of collaboration and interaction that should take place in the open, communal office spaces”[4]. This quote talks about how sandboxes are used as a space for a business or businesses to interact and try out new features without risking or harming their business. It’s more spoken of as a testing ground rather than a counter-measure. It’s like those times as a kid when we were being taught how to use PowerPoint and it had all these different fonts and slide animations. We would try all of them first in a separate PowerPoint so our work would not suffer any casualties and then once we decided on a font and/or slide animation we would implement it into our original work. In some way, we’ve all used a form of sandbox for our work.

Furthermore, a different author writes, “Sandbox testing proactively detects malware by executing, or detonating, code in a safe and isolated environment to observe that code’s behavior and output activity”[2]. This quote uses Sandboxes as a means of testing code for security purposes and not allowing a breach by isolation using a Sandbox. Unlike the business branch side of things, this way of using a Sandbox is indeed a counter-measure. It’s basically a bomb testing site but for code and incoming malware. One may say it’s taking batting practice before a game, just testing your swing, ball vision, and ability to make contact on that specific day. I used the statement “on that specific day” because it’s actually how this version of running a Sandbox works. Codes are unpredictable, there are things that even the developer himself doesn’t know would happen if the code is executed. One day your program may work flawlessly and the next day can be corrupt without even changing anything, maybe you missed a letter or number that allows the code to run more than a day or maybe a spelling mistake. All in all, this form of Sandbox is perfect for “detonating a bomb”.

Working Definition 

My major is Computer Systems branching into Cyber Security. As one can tell, the term Sandbox is very important in my field as many codes have to be tested. In my field, I would say a Sandbox is a safe zone where any developer or security analyst can try out any code or any level of work and look for vulnerabilities or decipher any malicious intent in the coding.

References 

[1]  “Sandbox.” Merriam-Webster.com Dictionary, Merriam-Webster, https://www.merriam-webster.com/dictionary/sandbox. Accessed 15 Oct. 2021.

[2] Forcepoint. 2021. What is Sandbox Security?. [online] Available at: <https://www.forcepoint.com/cyber-edu/sandbox-security> [Accessed 16 October 2021].

[3] Proofpoint. 2021. What is a Sandbox Environment? Definition & Setup | Proofpoint US. [online] Available at: <https://www.proofpoint.com/us/threat-reference/sandbox> [Accessed 16 October 2021].

[4] Clarke, D., 2021. The Serious Business of Sandboxes. [online] strategy+business. Available at: <https://www.strategy-business.com/article/The-Serious-Business-of-Sandboxes> [Accessed 16 October 2021].

750-Word Expanded Definition

750-Word Expanded Definition

TO: Prof. Jason Ellis
FROM: Rosario Garcia
DATE: 12/16/21
SUBJECT: Expanded Definition of programming

The purpose of this document is to explain furthermore about programming and the definition of it. “The process of writing and testing computer programs.” [1] Learn more explain about programming and software development. The term that the programming I defined is developing and create computer program. I defined software developing is create application when different coding language. How programming help in figure out ways to different to use different strategies methods solve problem quickly. How programming is a way to use problem-solving skills. That programming has made different ways to think and solve the problem. Make you think that there is more solution than one to a problem. Both program and software development have improved today and now in society it gives large impact to help business manage and do any tasks. The way the article express how programming is a method use problem-solving and other skills. “Identify and fix process-related problems, the measurement programs.” [2] At the same it identifies how software development is large part apart from programming in general. “Software development involves many processes, and measurement enables us to characterize, control, predict, and improve those processes.” [2] They mention how that software development able to have control the process of their own programs or project. On the other, programming they do deal with coding and the knowledge program there a limited for them in coding. Programming can be used in the real- world help area that need problem solving. The article explain more about software development is Measuring and Improving Agile Processes in a Small-Size Software Development Company. How software development benefits companies it a work in progress. Explain about the benefits of improve coding and help to learn more about coding in general. How software development improves their company in expand the (SME). How software development improves during the years continue to improve company. The other article I choose is Enhancing Confidence in Using Computational Thinking Skills via Playing a Serious Game: A Case Study to Increase Motivation in Learning Computer Programming for programming. I think that programming means to create and build code for applications. “Software development, understanding development performance and product quality.” [3] “A specific programming language so that they can develop their abilities in solving problems before they start programming.” [3, page2, line2] They need to choose the type if code that they want to choose before starting to program the software. They in the third article source how software development and programming are view in two different way they both related back to computer and create new programs. “These metrics significantly improve management of such processes as task estimation and bug fixing, which are crucial in rapid software development of high quality and stable software.” [2, page 5, section 5] It important to fix because if there any bug that aren’t fix, it failed to run the software and create program to the software. Software development requirement critical think but also problem-solving. Figure out different method of solutions to a problem. “This new version of the game will also provide an improved visualization for programming constructs. As an example, players will be able to use the decision-making construct in a variety of ways depending on how they want to overcome challenges.” [3 , pg19] They mention in the article how they need use programming for a visual game to improve the virtual the game. Programming how the game will work and test the programming language run on pc or it mobile friendly well. Plan how the challenges and figure how the multiplayer run on the software/game run well the users interact in the game. Everything revolves around the type of programming language to use and make sure it smoothly. It like running a software program check for any bugs or adjusted needed their always need attention the coding also the mechanic part of a program looking d entire software to see the entire picture. Even programming is a small part of the software developing. It the programming is the base for a software developer since it the beginning of the project.

References:
[1] Advanced Learner’s, Oxford. “Programming.” Programming Noun – Definition, Pictures, Pronunciation and Usage Notes | Oxford Advanced Learner’s Dictionary at OxfordLearnersDictionaries.com, Oxford Advanced Learner’s, 12 Dec. 2021, https://www.oxfordlearnersdictionaries.com/us/definition/english/programming.

[2] Choras, Michal, et al. “Measuring and Improving Agile Processes in a Small-Size Software Development Company.” IEEE Xplore, IEEE, 23 Apr. 2020, https://ieeexplore.ieee.org/document/9076670.

[3] Kazimoglu, Cagin. “Enhancing Confidence in Using Computational Thinking Skills via Playing a Serious Game: A Case Study to Increase Motivation in Learning Computer Programming.” IEEE Xplore, IEEE Access, 8 Dec. 2020, https://ieeexplore.ieee.org/document/9286386.

 

500 Word Summary

TO: Prof. Ellis
FROM: Rosario Garcia
DATE: 12/10/2021
SUBJECT: 500-Word Summary of Pandemic Parallels: What Can Cybersecurity Learn From COVID-19?

The purpose of this summary is to discuss the issues that the happen during the pandemic. How cybersecurity is important to learn about now in time during the pandemic everyone have been in remote using more technology. It mentions the pandemic there was different challenges since everyone needs find ways to use cybersecurity and protect our technology from cybersecurity threats.  “With COVID-19, there is still uncertainty about the efficacy of certain countermeasures or treatments, while in cybersecurity, some still insist that safeguards, such as antivirus software, do more to degrade the system performance than they do to protect.”[page 2 paragraph 9] It compares both how cybersecurity and COVID-19 they are virus, how they can change over time we need to figure out ways to protect from the covid-19. Learn how to safeguards the technology and how to understand the basic like strong passwords and use anti-virus software. It important to build knowledge more about cybersecurity learn how it protect learn how it works. It important that the people understand the need to know about cybersecurity learning way to protect your privacy and information online.  â€śSimilarly, basic cybersecurity safeguards (for example, using antivirus software and strong passwords and not clicking on suspicious attachments) apply across numerous systems and services but also vary depending on the context (for example, work versus home).” [page 2 paragraph 4] It very information to continue stay up to date on the latest software and on top change password recommend every 3 months but need to have double authorization better to notify the user verification it them login and not anyone else. Cybersecurity mean is to learn how to protect your privacy but also information yourself more protecting you on the internet. How to inform yourself from the cybersecurity also figure out ways to prevent any threat from you. “The pandemic has demonstrated that messaging should be part of a framework of protections. However, that wider framework must be ready to handle the result of effective messaging.” [page 4 paragraph 22] “Given the parallels, cybersecurity can learn valuable lessons from the COVID-19 messaging response. One could argue that we’ve seen more effective large-scale messaging and enforcement of safeguards with COVID-19 precisely because it poses a greater risk.” [page 4 paragraph 25] Even though the situation that we are in is bad situation it happens that we should take it as learning lesson. Even though we can recover though the pandemic and cyberattacks there just something that permanent can’t be undo, it makes to continue put guards up and stay safe. Follow the methods or steps to prevents getting sick or the spread the covid-19, for cybersecurity is to stay o top the update and keep devices and technology safe from virus-free by only trusting secured sites.

References:
[1] Furnell; Steven, et al. “Pandemic Parallels: What Can Cybersecurity Learn from Covid-19?” IEEE Xplore, IEEE, 15 Mar. 2021, https://ieeexplore.ieee.org/document/9378909.

Expanded Definition of Computer

TO:         Prof. Jason Ellis

FROM:     Jared Williams

DATE:         Oct 27, 2021

SUBJECT:     Expanded Definition of Computer

Introduction

The purpose of this document is to expand upon the definition of the word computer. In this document we will explore the various definitions of the term computer, the historical context surrounding the change in meaning of the term, and the way the term computer is used now.

Definitions

The first definition of computer in the Oxford English Dictionary is “a person who makes calculations or computations; a calculator, a reckoner; spec. a person employed to make calculations in an observatory, in surveying, etc.” [1, def. 1].  The second definition of Computer in the Oxford English Dictionary is “a device or machine for performing or facilitating calculation” [1, def. 2]. Both of [1]’s definitions state that mathematical calculation is involved, but they both differ regarding who or what is performing them.

From the 5th edition of McGraw-Hill’s Concise Encyclopedia of Science and Technology, a computer is “a device that receives, processes, and presents information. The two basic types of computers are analog and digital,” [2, p. 519] and from the 7th edition of A Dictionary of Computer Science, “A device or system that is capable of carrying out a sequence of operations in a distinctly and explicitly defined manner” [3, p.?]. These definitions strictly speak about machines performing calculations, no longer mentioning a person performing calculations.

The term computer originally referred to a human being who was incredibly skilled in mathematical computation but over time, the term fell more in line with the definitions of [2] and [3]. Historians may be the only people who refer to the original definition of a computer since their field of study has to do with revisiting the past. As technological advances progressed, the human component of computer was discarded and machine/device took its place as evidenced by definition 2 in [1], and the definitions of [2] and [3]. Now the phrase computer only brings images of machines in varying sizes to mind.

Context

“I haue read the truest computer of Times, and the best Arithmetician that euer breathed, and he reduceth thy dayes into a short number” [1]. This is the earliest use of the term computer according to the Oxford English Dictionary.  This quote can be found in Richard Braithwaite’s Yong Mans Gleanings published in 1613. In the context of this quote, a computer is an arithmetician, a person expertly skilled in calculation and counting. The year of this quote is important, as electricity was yet to be discovered which means there were no machines to do calculations.  

In the 1940’s the term computer had taken a step closer to today’s definition. A section from the New York Times published on Jan 1947 states “Two electronic computers that will handle complex arithmetical problems faster than earlier models were described yesterday at conference sessions of the winter meeting of the American Institute of Electrical Engineers at 33 West Thirty-Ninth Street” [4, p.5]. The author of this article must make a distinction between an electronic computer and a human one since human computers were not rendered obsolete just yet. Electronic computers of the time were very expensive and very big, needing a team of people and machinery to transport them and entire rooms dedicated to their use. It’s important to note that these computers, while electronic, were analog. Digital computers were the next step but hadn’t made their debut yet.

From an encyclopedia published in 2005: “The term digital computer—or simply, computer—embraces calculators, computer workstations, control computers (controllers) for applications such as domestic appliances and industrial processes, data-processing systems, microcomputers, microcontrollers, multiprocessors, parallel computers, personal computers, network servers, and supercomputers.” [5, p. 668] By the turn the millennium, computers had drastically scaled down in size while simultaneously upscaling in terms of their abilities. They have expanded beyond only mathematical calculations, now becoming an umbrella term. Computers had transitioned from analog to digital and no longer spanned an entire room. They were present in homes, businesses, offices, etc. The association of the term computer with a machine is so strong, future generations may not even know a human once held that position unless they look back on history. 

Working Definition

The definition the term computer largely relies on the time period you’re discussing. If I was to define computer today it would sound something like this:  

Computer – A digital electronic device or machine capable of receiving, computing, processing, and outputting data in various forms. 

References:

[1] “Computer,” in Oxford English Dictionary, 3rd ed. Oxford, UK: Oxford Univ. Press, Jun. 2008, def. 1 & def. 2. [Online]. Available: https://www.oed.com

[2] “Computer,” in Concise Encyclopedia of Science and Technology, 5th Edition. New York, NY: McGraw-Hill, 2005, p.519. [Online]. Available: https://go-gale-com.citytech.ezproxy.cuny.edu/ps/retrieve.do?resultListType=RELATED_DOCUMENT&searchType=BasicSearchForm&userGroupName=cuny_nytc&inPS=true&contentSegment=&prodId=GVRL&isETOC=true&docId=GALE|CX3475801389, Accessed: Oct 6, 2021.

[3] “Computer,” in A Dictionary of Computer Science, A. Butterfield, G. E. Ngondi, A. Kerr, 7th Edition., Oxford University Press, 2016. [Online]. Available: https://www.oxfordreference.com/view/10.1093/acref/9780199688975.001.0001/acref-9780199688975, Accessed: Oct 6, 2021.

[4] Author Unknown, “COMPUTER BEATS BRAIN,” New York Times, p.5, Jan 31, 1947. [Online]. Available: https://www.nytimes.com/1947/01/31/archives/computers-beat-brain-new-electronic-devices-said-to-be-100000-times.html?searchResultPosition=3, Accessed: Oct 10, 2021.

[5] “Digital Computer,” in Concise Encyclopedia of Science and Technology, 5th Edition. New York, NY: McGraw-Hill, 2005, p.668. [Online]. Available: https://go-gale-com.citytech.ezproxy.cuny.edu/ps/retrieve.do?resultListType=RELATED_DOCUMENT&searchType=BasicSearchForm&userGroupName=cuny_nytc&inPS=true&contentSegment=&prodId=GVRL&isETOC=true&docId=GALE|CX3475801781, Accessed: Oct 13, 2021.