Weekly Writing Assignment, Week 11

This is an individual writing assignment based on your team’s collaborative project. Each team member should write a short memo of no more than 250-words addressed to Prof. Ellis that describes what research responsibility he/she has been delegated or volunteered to do this week for the team project and include three IEEE references to articles and/or ebooks found through the City Tech Library that might be useful for your team’s research. Copy-and-paste your memo into a comment made to this post.

12 thoughts on “Weekly Writing Assignment, Week 11”

  1. TO: Prof. Ellis
    FROM: Kanak Das
    DATE: NOV. 23, 2021
    SUBJECT: 250-Word Summary of Article About Network Wireless Security

    When we talk about network in computer, it also includes huge responsibility in security as well as wireless security. It is one of the most important and fundamental topic in Networking. The reason this is an essential research in this topic is because Network security helps in protecting personal data, files, and others important information that is connected to devices. Increasing network security, you decrease the chance of privacy spoofing, identity or information theft and so on. Wireless network has become one of the fastest technologies for everyone’s benefit, which is a Computer Network that allows computing devices to communicate with each other without being connected through physical communications medium, such as networking cable or any involvement of wire. It is usually reply upon radio communication and wireless Network are implemented at the physical layer which is Layer 1 of the OSI model. The importance of wireless security is that it is all in one person under control. The owner can control it from anywhere nearby, without any need of wire or cable. Some of the reasons are, trusted video security solutions, commitment to quality with superior service, for personal protection.
    Wireless technologies use radio frequency transmission as the means for transmitting data, whereas wired technologies use cables. Wireless technologies range from complex system, such as WLAN which is Wireless Local Area Network, when we use cell phones and have wireless headphones, through the use of Bluetooth to listen to songs, and other small devices that does not require wire. moreover, we also have, WPA which is wireless Access Point, is hardware device that allows properly equipped computing device to connect wirelessly to a network.

  2. To: Prof. Ellis
    From: DeAndre Badresingh
    Date: November 23, 2021
    Subject: 250-Word Summary of Article About Network Wireless Security

    Our group came together and chose the topic of Network / Wireless Security. We came together and divided each section of the report amongst each other. My individual responsibility when contributing to this report is on the topic of Network Breaches. I will be discussing the types of breaches that are involved, how they are detected, the steps to mitigate the situation, and preventative measures. Considering that the topic of network breaches is a fairly broad topic, I intend to focus more on the aspect of security and privacy among personal and business usages, Finally, I will be using academic resources on my part to further include details from reported studied on the topics of breaches. This will cover all the mention aspects above and many more important information that may be useful in the report. The resources will be cited in IEEE format and will be used from academic websites, journals, and various articles.

  3. To: Prof. Ellis
    From: Roshel Babayev
    Date: November 23, 2021
    Subject: Summary of Article About Network Security

    In our group, we’ve decided upon the topic of Network Security in order to demonstrate just how valuable security is. My responsibility for this will be to discuss how to solve the problem of network security. Security is quite a broad topic but I hope to elaborate on the main key points as a very critical part of security is knowledge. When you know how something works, you have the ability to disrupt the chain and exploit the weakest link. Keeping everyone updated on a matter is very critical as it can prevent this specific type of exploitation from being used. Wireless technology has been in use for quite some time and some vulnerabilities have been discovered for it. While you may not have full control over security in your device(s), you can keep it restrictive and prevent others from gaining unauthorized access.

  4. TO: Prof Ellis
    FROM: Brandon Sosa
    DATE: November 23rd, 2021
    SUBJECT: 250-Word Summary on Blockchain Technology

    Our group came together to decide on the topic of “Blockchain Technology”. After selecting the topic, we discussed who will be doing what for the group project. My responsibility for the project will be to look for 3 to more sources to use for the group project. My sources will be about Blockchain technology and how to use it in the real world. I will be discussing what is blockchain technology and what it is used for, what is so special about it and how it is used with technology companies. Then, I will provide 2-3 examples on how blockchain is used by companies and how it’s used to store data. The resources that I find will be cited in IEEE format and it will be used from the city tech library, the academic website, and other online articles.

  5. To: Professor Ellis
    From: Shemei John
    Date: November 23rd, 2021
    Subject: 250 word memo on group Research Project assignment role

    The purpose of this memo is to convey my responsibilities concerning my group’s analytical research report paper on Block Chain Technology. My primary role will be to utilize techniques I have learned in this class thus far to create a structured outline summary of the entire paper for the group. So, after collaborating with Brandon, who’s primary job is to research, I will also assist by finding an additional three sources for our research paper. For the time being, we have decided to go ahead and being our roles and rendezvousing this coming weekend, and finally collaborating together with the work thus far. By this weekend I will have created a structured outline for the remaining members to follow in writing the introduction and body of the research paper. Since Block chain technology is a digital, intangible asset, in this research paper I will be addressing questions like, “what is block chain technology?” and “How did block chain technology became part of the financial aspect of our society?” or in other words “what validates block chain technology and makes it legitimate?” and also, the pros and cons of block chain technology, discussing some issues that block chain technology can help solve. My contributed sources will reflect those questions.

  6. TO: Prof Ellis.
    FROM: Ulises Mora
    DATE: 11/24/2021
    SUBJECT: 250-Word Summary about Network Security

    My group decides to talk about Network Security, my part of the project will oversee the history and origins of network wireless and network security. I will look for the etymology of the word, in which people began to use this term, frequent similarities to what people imagine it to be. In addition, I will look for some history of network security in articles on the City Tech library, internet pages and any source that helps me to inform all those readers who have no idea how this term originated and its definition.

  7. TO: Prof. Ellis
    FROM: Shuaixiang Feng
    DATE: NOV. 24, 2021
    SUBJECT: 250-Word Summary of Article About Network Security
    Our group topic is network security, which is a massive topic in the computer area. I volunteer to represent part of the advantage and disadvantages of Network security. As I know, network security is a necessary technology for the Internet. It defends our privacy while we are playing on the Internet. In our computer has a couple of ways or programs that protect the computer. Those are Encryption, Firewalls, Antivirus programs, and Monitored Internet Access. I will explain and discuss each of those programs, the purposes, advantages, and disadvantages in the network security area.

  8. TO: Prof. Ellis
    FROM: Quazi Hedayet
    DATE: NOV. 24, 2021
    SUBJECT: 250- word Summary of Technical issue of CyberSecurity

    We chose as a group to emphasize our collaborative project on the technical issue of cybersecurity. The issue with cybersecurity included that, regarding the world wide web, continued globalization and technology innovations, cybersecurity persists, an issue that several users neglect. Since others potentially modify private statistics toward their own compensation, safeguarding private information over the internet is essential. Including the Bureau of Justice Statistics, approximately 67 percent of consumers are now being victimized to at least one unsuccessful computer hacker. We must raise public awareness about the significance of cybersecurity as a congregation before further folks succumb to its tactics. This issue will involve a large number of different social media platforms, and one that cybercriminals prominently approach in order to acquire data from consumers. This could, nevertheless, be remedied by increasing consumer cybersecurity insights to make cybersecurity initiatives far more available to the public. We selected this subject since it was among the most significant challenges in today’s generation, in our perspective. We intended to raise awareness about the importance of cybersecurity and how folks can safeguard their personally identifiable information. Quazi Hedayet, Jiaqi, Rameen, Jun, and Hamzat are in charge of putting the Research Report together. With the help of Quazi Hedayet, Jiaqi was in charge of building up the OpenLab project site. Rameen, Jun, and Hamzat were in charge of putting the presentation together. Each team member was instructed to research a particular perspective of cybersecurity. Rameen was in charge of the introduction, Jun of the solutions and conclusion, Hamzat of the problems and obstacles, and Jiaqi of the cybersecurity implements. My initial research emphasized on the Effectiveness of Cybersecurity. Collaborating with my team members was indeed a privilege even though they were dependable and educated. We correspond once a week via WhatsApp regarding our project and accumulated knowledge and suggestions in order to accomplish it on time.

  9. To: Prof. Ellis
    From: Rameen Khan
    Date: November 25, 2021
    Subject: 250-Word Summary of Technical issue of Cybersecurity

    We chose as a group to emphasize our collaborative project on the technical issue of cybersecurity. The issue with cybersecurity included that, regarding the world wide web, continued globalization and technology innovations, cybersecurity persists, an issue that several users neglect. Since others potentially modify private statistics toward their own compensation, safeguarding private information over the internet is essential. Including the Bureau of Justice Statistics, approximately 67 percent of consumers are now being victimized to at least one unsuccessful computer hacker. We must raise public awareness about the significance of cybersecurity as a congregation before further folks succumb to its tactics. This issue will involve a large number of different social media platforms, and one that cybercriminals prominently approach in order to acquire data from consumers. This could, nevertheless, be remedied by increasing consumer cybersecurity insights to make cybersecurity initiatives far more available to the public. We selected this subject since it was among the most significant challenges in today’s generation, in our perspective. We intended to raise awareness about the importance of cybersecurity and how folks can safeguard their personally identifiable information. I will be in charge of the introduction including background and history. I will use scholarly resources to supplement details from previously published studies on the subject of cybersecurity. As a result, the materials will be cited in IEEE format and will be drawn from the City Tech Library, journals, and other sources.

  10. To: Prof. Ellis
    From: Ron Bepat
    Date: November 29, 2021
    Subject: 250-Word Summary of Network Security
    What my role is use cases of wireless infrastructure which i can’t really find much on but i used the word routers on IEEE explore since that’s part of the network infrastructure. I’m most likely going to ask my group mates if i can change my subject but for now this is my role which I will research. What i might change it instead to once they give me approval is to talk about network topology and how it’s important for a secure network to have a proper network topology because it’s more easier to find on IEEE Explore and more broaden topic.
    (I also volunteered myself to help my other teammates in their fields if necessary for our project because I ‘m available to help them if needed.)

    These are my IEEE explore citations to articles i could use on my research
    Y. Kai, Y. Wang and B. Liu, “GreenRouter: Reducing Power by Innovating Router’s Architecture,” in IEEE Computer Architecture Letters, vol. 12, no. 2, pp. 51-54, July-Dec. 2013, doi: 10.1109/L-CA.2012.23.
    F. Haque and S. Ahmed, “Overview of router architectures,” 2004 International Networking and Communication Conference, 2004, pp. xv-, doi: 10.1109/INCC.2004.1366565.
    James Aweya, “Software Requirements for Switch/Routers,” in Switch/Router Architectures: Shared-Bus and Shared-Memory Based Systems , IEEE, 2018, pp.61-86, doi: 10.1002/9781119486220.ch4.

  11. TO: Prof Ellis.
    FROM: Jiaqi Huang
    DATE: 12/2/2021
    SUBJECT: 250-Word Summary about Cybersecurity

    Our group’s topic is cybersecurity, a popular and relevant topic. After discussion, we decided to divide the topic into five parts so that all of us can work evenly in the project. And I am in charge of the cybersecurity implements part. I plan to begin this part with the standard of safety in cybersecurity and how to achieve the standard. Nowadays is an internet world, most of us can not live without the support of the internet. We upload our information to the internet instead of writing it down on paper. Our personal information, our bills, etc. So we all know how important it is to make sure cybersecurity is safe so it is also important to figure out how to achieve this safety.
    Here are some sources I found in the library I may need for this project in the future:
    1. Anand Handa; Rohit Negi; Sandeep Kumar Shukla, “Implementing Enterprise Cybersecurity with Open-Source Software and Standard Architecture,” in Implementing Enterprise Cybersecurity with Open-Source Software and Standard Architecture , River Publishers, 2021, pp.i-xxiv.
    2. J. Wang, D. Brylow and D. Perouli, “Implementing Cybersecurity into the Wisconsin K-12 Classroom,” 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), 2019, pp. 312-317, doi: 10.1109/COMPSAC.2019.10225.
    3. “Cybersecurity Management: Implementing Cybersecurity Controls.” Baker Tilly, https://www.bakertilly.com/insights/cybersecurity-management-implementing-cybersecurity-controls.

  12. To: Professor Ellis
    From: Edwin Ascencio
    Date: 11/23/21
    Subject: 250-Word Summary on Blockchain Technology

    The purpose of this memo is to explain my responsibility regarding the team research report on Blockchain technology. Our team communicated beforehand our group decided to research cryptocurrency and energy consumption, but we could not find any sources regarding the topic in the Citytech Library. Our team decided research something that relates to cryptocurrency and that was Blockchain technology. In our group chat we were discussing and assigning roles that will contribute to the project. My role is to research problem concerning the regulation of Blockchain technology. There is no authority or rules when transaction occurs and only the participant involved are responsible. Without regulations participant have access and control of an individual data and must ensure protection on behalf of the individual. My sources will contain more information on regulations and problems of Blockchain technology. I will explore Citytech Library for additional reliable sources on Blockchain regulation. The two-search engine within Citytech Library I will be using is Academic OneFile and IEEE Xplore. The source that I find will then be cited in IEEE format. My secondary role is to write 1000 words about Blockchain regulation, issues, and solutions. Every week we will be updating each other on our findings and progress towards the report.

Leave a Reply