Weekly Writing Assignment, Week 12

Due to the Thanksgiving Holiday, I am posting this week’s lecture and weekly writing assignment early.

After watching this week’s lecture and continuing your teamwork on the Analytical Research Report, each student should individually write a memo (TO, FROM, DATE, and SUBJECT: Research Project Update) that describes that individual’s work and responsibilities for researching and writing on the project and copy-and-paste any writing (including quotes that you might discuss) into your memo. Post your memo as a comment to this Weekly Writing Assignment post. Again, this is an individual assignment that demonstrates what each team member is responsible for working on their team’s project.

12 thoughts on “Weekly Writing Assignment, Week 12”

  1. TO: Prof. Ellis
    FROM: Kanak Das
    DATE: NOV. 23, 2021
    SUBJECT: Network Wireless Security
    ļ¶ Paragraph one and two : Introduction
    ļƒ˜ Definition of the Wireless security
    ļƒ˜ The importance of the Wireless security
    ļƒ˜ Overview of the Wireless Technology
    ļ‚§ Such as: WLAN/Layer Security

    ļ¶ Body paragraph Three and Four: Difficulties may encounter
    ļƒ˜ Some Advantages and disadvantages of Wireless Security
    ļƒ˜ Encryption
    ļƒ˜ Threats to the network
    ļ‚§ Hacking

    ļ¶ Paragraph Five and Six: Solve the problem
    ļƒ˜ How it can be solved with strong security and passwords
    ļƒ˜ Security and policies
    ļ‚§ Materials that needs/Techniques and Technology
    ļ‚§ Security Technologies
    ļ‚§ Wi-fi Protected Access (WPA)

    ļ¶ Paragraph Seven and Eight: Other Networking Solutions
    ļƒ˜ Security in Public Spaces
    ļƒ˜ If needs use Virtual Private Network (VPN)
    ļƒ˜ Implementation case study. (Web Titan)

    ļ¶ Conclusion: Nine and Ten
    ļƒ˜ Make sure to See everything Works
    ļƒ˜ Connect
    ļƒ˜ Avoid untrusted Networks
    ļƒ˜ Future of Wireless network.

  2. TO: Prof. Ellis
    FROM: Kanak Das
    DATE: NOV. 30, 2021
    Subject: Research Project Update

    Currently we had to revise our problem or subject matter we were researching as it wasn’t a problem the new Subject/problem my group will be focusing on is “How to Fix the problem of a network being hack and ways to prevent it.”
    what I’ve done is made new roles for the team and created the google document for the team the write
    currently every member is connected to this page and will be starting their roles shortly.
    I’ve taken upon myself to start them off with an introduction which will be shared at the bottom of this statement.
    I’ve also recently founded some good resources for this group writing assignment that can help us out using the City Tech Library.
    I also volunteered myself to help out the group with any peer review editing and any updates I can help them on their analysis of the research they will be doing.
    New Roles:
    1. Background history of the problem (Ulises)
    2. Knowledge of the cause and nature of the problem (Kanak)(Ron)
    3. How to solve problem (Shuaixiang)
    4. How to explain the problem and offer general solution to the problem (DeAndre)(Rosh)
    I came up with these roles from the post Professor Ellis made for the project

    Intro:
    In everyday life everyone seems to be connected. Whether itā€™s through their phones, computers or tablets. Many people donā€™t know the dangers lurking on the web. Many people are out there compromising peopleā€™s data and taking it away for themselves, itā€™s cruel and itā€™s unjust. Stealing peopleā€™s information is a crime and people should be aware of how to protect themselves. What is the importance of Cyber security, and what role does it play in peopleā€™s lives that makes it so important to protect? There are not many people out there unaware of this problem and donā€™t realize how important their online security is until itā€™s too late. In todayā€™s society a personā€™s phone is a part of their identity and someone stealing that data from their device is like stealing their online identity. Cyber Security has been on the rise for sometime now as technology advances more breaches from hackers have continued to happen. Once a person learns how to protect themselves properly they will be able to bypass many mistakes the common person makes. It is not hard for someone to protect themselves, it’s just a process they must dedicate to themselves and to find a routine to help prevent their chances of being hacked. There is no 100% guaranteed sure fire way to prevent a hacker from hacking your devices; it’s just someone using proper methods to make it harder for the hacker to penetrate their security. Being hacked is a big threat to someone’s identity as many peopleā€™s personal information is out there on the internet, and could be also easily searched on the internet as well. A simple google search can show a personā€™s social media accounts, sites that show their contact info and address and also many sites with their names on it. Not many people are aware their online identities were already out there due to them inputting their information on sites that donā€™t respect their privacy and leads to creeps on the internet willing to steal more information on them. A hacker can steal your account info, passwords, and even banking accounts and even take out money and transfer that compromised personā€™s money onto the hackerā€™s personal account leading to fraud and many other crimes. A personā€™s online identity in the year 2021(going onto the year 2022) is considered their real identity as now everything we do could be done and is done online on a database storing your information.
    If not careful enough these companies who have your information could be hacked and also you will be losing your valuable data, which means some hacker who you donā€™t know is out there stealing your information and keeping it so they can get into your personal accounts and steal your data. There were many attempts that happened in the past that lead people to lose their information from these big corporations who never prioritize their users’ safety leading to hackers breaching their systems and compromising them. Hackerā€™s can have access to your records and files of what you bought from this company and your account information pretending to be you if they use your account to shop online. Also They may have any saved credit card information on that account and use it on other sites.

    (i might edit some sentences out or put more once we’ve gain more research.)

    This is all I’ve one for now but I will progress more as this week progresses and by Next Wednesday I should be ready with my portion so i can make sure my fellow teammates are on track and this paper sounds coherent.

  3. TO: Prof. Ellis
    FROM: Ulises Mora
    DATE: 11/30/2021
    Subject: Research Project Update

    My team were having a problem choosing a topic for the project, until recently we were able to decide the problem which is the network being hacked. What I must investigate is the background of the problem and history of the problem, which is when does these hacks started to begin and the reasons. At this moment I do not have any quote or any resource, but this week I will begin to contribute to the team with what I have to investigate.

  4. TO: Prof. Ellis
    FROM: Quazi Hedayet
    DATE: 12.01.2021
    Subject: Research Project Update

    Significance of Cybersecurity

    In our society and economy, digitization is becoming increasingly important. Humans and technology are linked in today’s society via network communication linkages. Such is the era of the internet and cellular devices. Working, playing, shopping, watching movies and serials, having a conversation, composing lyrics to our favourite tunes, ordering meals, making payments, socializing, and greeting friends and family on auspicious occasions are all technology-based activities. It genuinely connects us to ease and elegance. Because of the rapid advancement of technology, our data may now be followed, and objects can be accessed using an Internet connection. We rely on the internet so much these days that we desire it to be secure and reliable.

    Cybersecurity concerns occur illegitimately owing to attackers wielding a magic incantation, however the security vulnerabilities existent within the system provides the attackers a considerable advantage. Currently, we live in a society where everyone is encircled by a variety of wireless technologies and applications. Assault on information technology (IT) networks are one thing; but assaults on wireless services, which are the Critical Information Infrastructure, may be a matter of life and death (CII). As time goes on, we’ll see how television white spaces and other spectrum white spaces are being used to meet rising broadband Internet access needs. In the context of a user-centric system, the fifth expansion of wireless communication systems (5G) is hammering on our door. As shown in the author, 5G will be a much more enhanced form of the global Communications Multimedia Communication Village (GIMCV) and Wireless Innovative System for Dynamically Operating Megacommunications (WISDOM) concepts, which were first proposed in 2008. (Prasad, 2008).

    References
    (LEAP), L. E. (2018). A to Z of Cyber Crime. Pune: Laws, Asian School of Cyber.
    Elvira Ismagilova, L. H. (2020). Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction Framework. Information Systems Frontiers. doi: https://doi.org/10.1007/s10796-020-10044

  5. TO: Prof. Ellis
    FROM: Rameen Khan
    DATE: 01/01/2021
    Subject: Research Project Update

    Introduction
    Today’s man can send and receive any type of data, whether it’s an e-mail, an audio or video file, with the press of a button, but has he ever considered how securely his data is being transmitted or sent to the other person without any information being leaked?? Cyber security is the answer. In today’s world, the Internet is the fastest-growing infrastructure. Many new technologies are transforming the face of humanity in today’s technological world. However, because of this new technology, we are unable to protect our personal information as well as we would want, and as a result, cybercrime is on the rise. Because more than 60% of all commercial transactions are now conducted online, this area necessitated a high level of security to ensure transparent and efficient transactions. As a result, cyber security has become a hot topic. The scope of cyber security extends beyond safeguarding information in the IT business to include a variety of other domains such as cyber space. [1]
    Cloud computing, mobile computing, E-commerce, online banking, and other cutting-edge technologies all require a high level of security. Because these technologies contain sensitive information about a person, their security has become a priority. Enhancing cyber security and safeguarding important information infrastructures are critical to the security and economic well-being of any country. Making the Internet safer (and protecting Internet users) has become a key component of both new service development and government regulation. The battle against cybercrime needs a more comprehensive and secure strategy. Given that technical measures alone cannot prevent any crime, it is vital that law enforcement authorities be given the tools they need to properly investigate and prosecute cybercrime. Many countries and governments are now enacting strong cyber security legislation in order to avoid the loss of sensitive data. Every individual must be educated on cyber security in order to protect oneself from the growing number of cyber-crimes.
    Reference
    [1] McGettrick, Toward Curricular Guidelines for Cybersecurity: Report of a Workshop on Cybersecurity Education and Training, ACM, Aug. 2013.

  6. TO: Prof. Ellis
    FROM: Rameen Khan
    DATE: 01/01/2021
    Subject: Research Project Update

    Introduction
    Today’s man can send and receive any type of data, whether it’s an e-mail, an audio or video file, with the press of a button, but has he ever considered how securely his data is being transmitted or sent to the other person without any information being leaked?? Cyber security is the answer. In today’s world, the Internet is the fastest-growing infrastructure. Many new technologies are transforming the face of humanity in today’s technological world. However, because of this new technology, we are unable to protect our personal information as well as we would want, and as a result, cybercrime is on the rise. Because more than 60% of all commercial transactions are now conducted online, this area necessitated a high level of security to ensure transparent and efficient transactions. As a result, cyber security has become a hot topic. The scope of cyber security extends beyond safeguarding information in the IT business to include a variety of other domains such as cyber space. [1]
    Cloud computing, mobile computing, E-commerce, online banking, and other cutting-edge technologies all require a high level of security. Because these technologies contain sensitive information about a person, their security has become a priority. Enhancing cyber security and safeguarding important information infrastructures are critical to the security and economic well-being of any country. Making the Internet safer (and protecting Internet users) has become a key component of both new service development and government regulation. The battle against cybercrime needs a more comprehensive and secure strategy. Given that technical measures alone cannot prevent any crime, it is vital that law enforcement authorities be given the tools they need to properly investigate and prosecute cybercrime. Many countries and governments are now enacting strong cyber security legislation in order to avoid the loss of sensitive data. Every individual must be educated on cyber security in order to protect oneself from the growing number of cyber-crimes.
    Reference
    [1] McGettrick, Toward Curricular Guidelines for Cybersecurity: Report of a Workshop on Cybersecurity Education and Training, ACM, Aug. 2013.

  7. TO: Prof. Ellis
    FROM: Shuaixiang Feng
    DATE: Dec. 1, 2021
    Subject: Research Project Update
    Our group members make a discussion on Monday and designed another problem as the topic on this project, which is ā€œHow to Fix the problem of a network being hacked and ways to prevent it.ā€ Unfortunately, I have to work on Tuesday and Wednesday. I cannot do a lot of research on the new topic, but I will follow the outline and research after Wednesday.

  8. TO: Prof. Ellis
    FROM: Norbert Derylo
    DATE: Dec 2, 2021
    SUBJECT: Research Project Update
    Our group have started to consolidate our research together and look at how we can use the research. Personally I found 3 articles that can be used when writing about the security of blockchain. We also discussed how we want to write our outlines. We made sure everyone was on the same page and that there wouldn’t be any mishaps.

  9. To: Prof. Ellis
    From: Brandon Sosa
    Date: December 13, 2021
    Subject: Research Project Update

    My responsibilities for the group and for myself are to keep in touch with everyone and make sure everyone is on track doing what they need to be doing for the project, So far we have the topics of what each person is going to be writing about and researching. As of now, we have as a group 5-6 articles relating to the topic of blockchain technology with perspective findings.

  10. TO: Prof. Ellis
    FROM: Jun Gao
    DATE: 12/01/2021
    Subject: Research Project Update

    There are several viable solutions to the advent of cyber-crime that produce relevant resolutions concerning preventive measures.

    As the progression of strategic intelligence measures continues to create the framework for solution development to occur, new aspects of progression within the field of online security continue to present efficient methods of prevention for cyber-related criminal activities.

    Understanding the core issue will help society develop cybersecurity and its prevalence within active use, thus creating optimal circumstances for increases in cybercrime to be mitigated.

    As education becomes a pertinent factor within anti-crime initiatives, the notion of human error within the overall issue becomes an increasingly relevant topic.

    Creating social enterprises to help lower the availability of threats reaching possible victims and continuing education measures to help dissolve the notion of human error are positive solutions that help prevent cybercrime from occurring.

  11. To: Professor Ellis
    From: Edwin Ascencio
    Date: 12/13/21
    Subject: Research Project Update

    My contribution to this team is work on Blockchain regulations and communicate with my teammates on our current progress with the project. Our team has divided the workload among each team member. Each member will be responsible for selecting a topic to discuss about blockchain and writing 1000 word about the topic. I currently found only 2 articles that talks about Blockchain regulations, and I have started writing my topic. Our team communicates frequently and this allow use to be on track and avoid any miscommunication.

Leave a Reply