Due to the Thanksgiving Holiday, I am posting this week’s lecture and weekly writing assignment early.
After watching this week’s lecture and continuing your teamwork on the Analytical Research Report, each student should individually write a memo (TO, FROM, DATE, and SUBJECT: Research Project Update) that describes that individual’s work and responsibilities for researching and writing on the project and copy-and-paste any writing (including quotes that you might discuss) into your memo. Post your memo as a comment to this Weekly Writing Assignment post. Again, this is an individual assignment that demonstrates what each team member is responsible for working on their team’s project.
TO: Prof. Ellis
FROM: Kanak Das
DATE: NOV. 23, 2021
SUBJECT: Network Wireless Security
ļ¶ Paragraph one and two : Introduction
ļ Definition of the Wireless security
ļ The importance of the Wireless security
ļ Overview of the Wireless Technology
ļ§ Such as: WLAN/Layer Security
ļ¶ Body paragraph Three and Four: Difficulties may encounter
ļ Some Advantages and disadvantages of Wireless Security
ļ Encryption
ļ Threats to the network
ļ§ Hacking
ļ¶ Paragraph Five and Six: Solve the problem
ļ How it can be solved with strong security and passwords
ļ Security and policies
ļ§ Materials that needs/Techniques and Technology
ļ§ Security Technologies
ļ§ Wi-fi Protected Access (WPA)
ļ¶ Paragraph Seven and Eight: Other Networking Solutions
ļ Security in Public Spaces
ļ If needs use Virtual Private Network (VPN)
ļ Implementation case study. (Web Titan)
ļ¶ Conclusion: Nine and Ten
ļ Make sure to See everything Works
ļ Connect
ļ Avoid untrusted Networks
ļ Future of Wireless network.
TO: Prof. Ellis
FROM: Kanak Das
DATE: NOV. 30, 2021
Subject: Research Project Update
Currently we had to revise our problem or subject matter we were researching as it wasn’t a problem the new Subject/problem my group will be focusing on is “How to Fix the problem of a network being hack and ways to prevent it.”
what I’ve done is made new roles for the team and created the google document for the team the write
currently every member is connected to this page and will be starting their roles shortly.
I’ve taken upon myself to start them off with an introduction which will be shared at the bottom of this statement.
I’ve also recently founded some good resources for this group writing assignment that can help us out using the City Tech Library.
I also volunteered myself to help out the group with any peer review editing and any updates I can help them on their analysis of the research they will be doing.
New Roles:
1. Background history of the problem (Ulises)
2. Knowledge of the cause and nature of the problem (Kanak)(Ron)
3. How to solve problem (Shuaixiang)
4. How to explain the problem and offer general solution to the problem (DeAndre)(Rosh)
I came up with these roles from the post Professor Ellis made for the project
Intro:
In everyday life everyone seems to be connected. Whether itās through their phones, computers or tablets. Many people donāt know the dangers lurking on the web. Many people are out there compromising peopleās data and taking it away for themselves, itās cruel and itās unjust. Stealing peopleās information is a crime and people should be aware of how to protect themselves. What is the importance of Cyber security, and what role does it play in peopleās lives that makes it so important to protect? There are not many people out there unaware of this problem and donāt realize how important their online security is until itās too late. In todayās society a personās phone is a part of their identity and someone stealing that data from their device is like stealing their online identity. Cyber Security has been on the rise for sometime now as technology advances more breaches from hackers have continued to happen. Once a person learns how to protect themselves properly they will be able to bypass many mistakes the common person makes. It is not hard for someone to protect themselves, it’s just a process they must dedicate to themselves and to find a routine to help prevent their chances of being hacked. There is no 100% guaranteed sure fire way to prevent a hacker from hacking your devices; it’s just someone using proper methods to make it harder for the hacker to penetrate their security. Being hacked is a big threat to someone’s identity as many peopleās personal information is out there on the internet, and could be also easily searched on the internet as well. A simple google search can show a personās social media accounts, sites that show their contact info and address and also many sites with their names on it. Not many people are aware their online identities were already out there due to them inputting their information on sites that donāt respect their privacy and leads to creeps on the internet willing to steal more information on them. A hacker can steal your account info, passwords, and even banking accounts and even take out money and transfer that compromised personās money onto the hackerās personal account leading to fraud and many other crimes. A personās online identity in the year 2021(going onto the year 2022) is considered their real identity as now everything we do could be done and is done online on a database storing your information.
If not careful enough these companies who have your information could be hacked and also you will be losing your valuable data, which means some hacker who you donāt know is out there stealing your information and keeping it so they can get into your personal accounts and steal your data. There were many attempts that happened in the past that lead people to lose their information from these big corporations who never prioritize their users’ safety leading to hackers breaching their systems and compromising them. Hackerās can have access to your records and files of what you bought from this company and your account information pretending to be you if they use your account to shop online. Also They may have any saved credit card information on that account and use it on other sites.
(i might edit some sentences out or put more once we’ve gain more research.)
This is all I’ve one for now but I will progress more as this week progresses and by Next Wednesday I should be ready with my portion so i can make sure my fellow teammates are on track and this paper sounds coherent.
TO: Prof. Ellis
FROM: Ulises Mora
DATE: 11/30/2021
Subject: Research Project Update
My team were having a problem choosing a topic for the project, until recently we were able to decide the problem which is the network being hacked. What I must investigate is the background of the problem and history of the problem, which is when does these hacks started to begin and the reasons. At this moment I do not have any quote or any resource, but this week I will begin to contribute to the team with what I have to investigate.
TO: Prof. Ellis
FROM: Quazi Hedayet
DATE: 12.01.2021
Subject: Research Project Update
Significance of Cybersecurity
In our society and economy, digitization is becoming increasingly important. Humans and technology are linked in today’s society via network communication linkages. Such is the era of the internet and cellular devices. Working, playing, shopping, watching movies and serials, having a conversation, composing lyrics to our favourite tunes, ordering meals, making payments, socializing, and greeting friends and family on auspicious occasions are all technology-based activities. It genuinely connects us to ease and elegance. Because of the rapid advancement of technology, our data may now be followed, and objects can be accessed using an Internet connection. We rely on the internet so much these days that we desire it to be secure and reliable.
Cybersecurity concerns occur illegitimately owing to attackers wielding a magic incantation, however the security vulnerabilities existent within the system provides the attackers a considerable advantage. Currently, we live in a society where everyone is encircled by a variety of wireless technologies and applications. Assault on information technology (IT) networks are one thing; but assaults on wireless services, which are the Critical Information Infrastructure, may be a matter of life and death (CII). As time goes on, we’ll see how television white spaces and other spectrum white spaces are being used to meet rising broadband Internet access needs. In the context of a user-centric system, the fifth expansion of wireless communication systems (5G) is hammering on our door. As shown in the author, 5G will be a much more enhanced form of the global Communications Multimedia Communication Village (GIMCV) and Wireless Innovative System for Dynamically Operating Megacommunications (WISDOM) concepts, which were first proposed in 2008. (Prasad, 2008).
References
(LEAP), L. E. (2018). A to Z of Cyber Crime. Pune: Laws, Asian School of Cyber.
Elvira Ismagilova, L. H. (2020). Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction Framework. Information Systems Frontiers. doi: https://doi.org/10.1007/s10796-020-10044
TO: Prof. Ellis
FROM: Rameen Khan
DATE: 01/01/2021
Subject: Research Project Update
Introduction
Today’s man can send and receive any type of data, whether it’s an e-mail, an audio or video file, with the press of a button, but has he ever considered how securely his data is being transmitted or sent to the other person without any information being leaked?? Cyber security is the answer. In today’s world, the Internet is the fastest-growing infrastructure. Many new technologies are transforming the face of humanity in today’s technological world. However, because of this new technology, we are unable to protect our personal information as well as we would want, and as a result, cybercrime is on the rise. Because more than 60% of all commercial transactions are now conducted online, this area necessitated a high level of security to ensure transparent and efficient transactions. As a result, cyber security has become a hot topic. The scope of cyber security extends beyond safeguarding information in the IT business to include a variety of other domains such as cyber space. [1]
Cloud computing, mobile computing, E-commerce, online banking, and other cutting-edge technologies all require a high level of security. Because these technologies contain sensitive information about a person, their security has become a priority. Enhancing cyber security and safeguarding important information infrastructures are critical to the security and economic well-being of any country. Making the Internet safer (and protecting Internet users) has become a key component of both new service development and government regulation. The battle against cybercrime needs a more comprehensive and secure strategy. Given that technical measures alone cannot prevent any crime, it is vital that law enforcement authorities be given the tools they need to properly investigate and prosecute cybercrime. Many countries and governments are now enacting strong cyber security legislation in order to avoid the loss of sensitive data. Every individual must be educated on cyber security in order to protect oneself from the growing number of cyber-crimes.
Reference
[1] McGettrick, Toward Curricular Guidelines for Cybersecurity: Report of a Workshop on Cybersecurity Education and Training, ACM, Aug. 2013.
TO: Prof. Ellis
FROM: Rameen Khan
DATE: 01/01/2021
Subject: Research Project Update
Introduction
Today’s man can send and receive any type of data, whether it’s an e-mail, an audio or video file, with the press of a button, but has he ever considered how securely his data is being transmitted or sent to the other person without any information being leaked?? Cyber security is the answer. In today’s world, the Internet is the fastest-growing infrastructure. Many new technologies are transforming the face of humanity in today’s technological world. However, because of this new technology, we are unable to protect our personal information as well as we would want, and as a result, cybercrime is on the rise. Because more than 60% of all commercial transactions are now conducted online, this area necessitated a high level of security to ensure transparent and efficient transactions. As a result, cyber security has become a hot topic. The scope of cyber security extends beyond safeguarding information in the IT business to include a variety of other domains such as cyber space. [1]
Cloud computing, mobile computing, E-commerce, online banking, and other cutting-edge technologies all require a high level of security. Because these technologies contain sensitive information about a person, their security has become a priority. Enhancing cyber security and safeguarding important information infrastructures are critical to the security and economic well-being of any country. Making the Internet safer (and protecting Internet users) has become a key component of both new service development and government regulation. The battle against cybercrime needs a more comprehensive and secure strategy. Given that technical measures alone cannot prevent any crime, it is vital that law enforcement authorities be given the tools they need to properly investigate and prosecute cybercrime. Many countries and governments are now enacting strong cyber security legislation in order to avoid the loss of sensitive data. Every individual must be educated on cyber security in order to protect oneself from the growing number of cyber-crimes.
Reference
[1] McGettrick, Toward Curricular Guidelines for Cybersecurity: Report of a Workshop on Cybersecurity Education and Training, ACM, Aug. 2013.
TO: Prof. Ellis
FROM: Shuaixiang Feng
DATE: Dec. 1, 2021
Subject: Research Project Update
Our group members make a discussion on Monday and designed another problem as the topic on this project, which is āHow to Fix the problem of a network being hacked and ways to prevent it.ā Unfortunately, I have to work on Tuesday and Wednesday. I cannot do a lot of research on the new topic, but I will follow the outline and research after Wednesday.
TO: Prof. Ellis
FROM: Norbert Derylo
DATE: Dec 2, 2021
SUBJECT: Research Project Update
Our group have started to consolidate our research together and look at how we can use the research. Personally I found 3 articles that can be used when writing about the security of blockchain. We also discussed how we want to write our outlines. We made sure everyone was on the same page and that there wouldn’t be any mishaps.
To: Prof. Ellis
From: Brandon Sosa
Date: December 13, 2021
Subject: Research Project Update
My responsibilities for the group and for myself are to keep in touch with everyone and make sure everyone is on track doing what they need to be doing for the project, So far we have the topics of what each person is going to be writing about and researching. As of now, we have as a group 5-6 articles relating to the topic of blockchain technology with perspective findings.
TO: Prof. Ellis
FROM: Jun Gao
DATE: 12/01/2021
Subject: Research Project Update
There are several viable solutions to the advent of cyber-crime that produce relevant resolutions concerning preventive measures.
As the progression of strategic intelligence measures continues to create the framework for solution development to occur, new aspects of progression within the field of online security continue to present efficient methods of prevention for cyber-related criminal activities.
Understanding the core issue will help society develop cybersecurity and its prevalence within active use, thus creating optimal circumstances for increases in cybercrime to be mitigated.
As education becomes a pertinent factor within anti-crime initiatives, the notion of human error within the overall issue becomes an increasingly relevant topic.
Creating social enterprises to help lower the availability of threats reaching possible victims and continuing education measures to help dissolve the notion of human error are positive solutions that help prevent cybercrime from occurring.
TO: Prof. Ellis
FROM: Rameen Khan
DATE: 12/01/2021
Subject: Research Project Update
TO: Prof. Ellis
FROM: Rameen Khan
DATE: 01/01/2021
Subject: Research Project Update
To: Professor Ellis
From: Edwin Ascencio
Date: 12/13/21
Subject: Research Project Update
My contribution to this team is work on Blockchain regulations and communicate with my teammates on our current progress with the project. Our team has divided the workload among each team member. Each member will be responsible for selecting a topic to discuss about blockchain and writing 1000 word about the topic. I currently found only 2 articles that talks about Blockchain regulations, and I have started writing my topic. Our team communicates frequently and this allow use to be on track and avoid any miscommunication.