Mamadou Diallo’s Expanded definition of computer Network Simulation and Network Security Auditing in A Spatial Context of An Organization (CNSNSASCO)

To: Prof. Ellis
From: Mamadou Diallo
Date: 03/26/2021
SBJECT: Expanded definition of Computer Network simulation and Network security auditing in A Spatial Context of an Organization (CNSNSASCO)

Introduction

Computer networking is the current mode of operation for most organizations today. The flow of information within and outside organizations is done using computer devices. The growing concern for the use of computer networking is data security and computer simulation. Some of the commonly used terms that address computer network security include Breach, firewall, and malware. A breach is a term used to refer to when a hacker has successfully accessed complete control of a computer device or a network. A Firewall is a software program that is put in place to prevent any corrupt or unauthorized access to a computer system or network. Finally, our main focus area, malware, refers to that malicious software that corrupts and destroys a computing device or network.

Definitions

The term malware is a broad description of specific malicious programs that include viruses, trojans, worms, and spyware(Bazrafshan et al., 2013). Although there is more malicious software affiliated with malware, we will focus on the four examples named above. The four are the most common types of malware that affect the network of an organization. Some of this malware can originate from within the organization, usually known as micro threats, or can come from outside the company, usually known as macro threats. Most of the macro threats come from competitors, government regulations, technological changes, and customer’s changes in taste and preferences. The micro threats originate from malicious persons inside the company or outside persons like hackers and crackers who might infect computer devices and networks with viruses, trojans, and worms.

Context

A computer virus is a malicious program that corrupts data in a computer. A computer virus, just like a human virus, can transfer itself from one computer to another. Computer viruses are dangerous to any organization and can make a company cone’s normal operations to a stand-still. When a computer virus finds its way into a company’s network, it might lead to a series of problems. A computer virus can erase important data from the company’s website, and it can also steal and manipulate secure information from the organization’s network(Misra et al., 2014). A virus can freeze the normal functions of a computer, which will alter the effectiveness of the device in the company. Therefore, to prevent a network from being infected by a computer virus, most companies have opted to use anti-virus programs and set up strong firewall systems to prevent the virus from affecting the computer network.

A trojan horse malware is a computer malware that allows hackers to access a computer using a back door like the historical trojan horse in the Greek stories that was used deceptively to lead to Troy’s fall. A trojan horse malware comes in the form of a computer application or program that the user downloads or installs in their device, unknowing its hidden intention (Nari & Ghorbani, 2013). The malware may pop-up as ads or emails that were not expected and once, they have been opened or installed in the device, they can be used by cyber thieves or hackers to breach the system or computer network. Therefore, employees who handle computer devices in an organization should be advised not to open any unnecessary online files or applications using its devices. 

A worm is a computer is malware that replicates itself to other computers in the same system. A worm is one of the most common malwares in computer network security. Unlike a virus, a worm can make copies of itself to other computers in the network, but a computer virus requires a host to move from one computer to another. A worm focuses on exhausting a shared network’s bandwidth and hard drive (Bazrafshan et al., 2013). Therefore, making copies of itself can fill up the hard drive with unnecessary files that will cause the network to overload and eventually collapse if unattended.

Additionally, a computer worm can steal and manipulate data in a system. Usually, a worm finds its way into a system through spam files and emails that were not expected. Therefore, IT experts advise staff to avoid using and opening up unexpected files using the company’s computers.

Spyware is another type of malware used to spy on the user without the user’s knowledge. Cyber thieves can use spyware malware to steal information from a device and corrupt data from a shared network while using the user’s data. Spyware malware is so malicious that hackers can use it to incriminate someone using their personal information(Misra et al., 2014). Spyware can track down someone’s personal information, including social media content, credit card statements, and identity. Therefore, when one realizes that spyware malware has infected their device, they should use anti-spyware removal software to ensure that their devices are free from foreign eyes.

Working Definitions

In conclusion, malware is one of the commonly used terms in computing today to address the aspect of computer network security. Therefore, since cybersecurity has become one of the main concerns in most organizations, it is necessary to address these malware issues and develop solutions to prevent such infections in organizations’ computer networks.

Reference

Bazrafshan, Z., Hashemi, H., Fard, S. M. H., & Hamzeh, A. (2013). A survey on heuristic malware detection techniques. IKT 2013 – 2013 5th Conference on Information and Knowledge Technology, 113–120. https://doi.org/10.1109/IKT.2013.6620049

Misra, A. K., Verma, M., & Sharma, A. (2014). Capturing the interplay between malware and anti-malware in a computer network. Applied Mathematics and Computation, 229, 340–349. https://doi.org/10.1016/j.amc.2013.12.059

Nari, S., & Ghorbani, A. A. (2013). Automated malware classification based on network behavior. 2013 International Conference on Computing, Networking and Communications, ICNC 2013, 642–647. https://doi.org/10.1109/ICCNC.2013.6504162

Summary of Shin et al.’s “A First Step Toward Network Security Virtualization: From Concept to Prototype”

TO: Prof. Ellis

FROM: Tarin Sultana

DATE: 03/03/2021

SUBJECT: 500-Word Summary of Article About Network Security

The following is a 500-word summary of a peer-reviewed article about how to secure virtualized network using Network Security Virtualization (NSV). The authors introduce a new method of network security virtualization using NETSECVISOR with the least management cost. According to the authors, “The main goal of this work is to propose a new idea, network security virtualization (NSV), and design a prototype system (with the name of NETSECVISOR) that can enable NSV in cloud-like networks to help all tenants easily use security services.” (Shin et al., 2015). To demonstrate the usefulness of Network Security Virtualization (NSV), network security follows two strategies: (i) transparently monitoring flows to preferred network security providers and (ii) allowing network security response functions on a network computer.  As an example of NSV setup, some essential elements are necessary, such as six routers (R1 – R6), three hosts (H1 – H3), 2 VMs (VM1 and VM2), and a Network Intrusion Detection System. By blocking network packets from each infected host, NETSECVISOR protects corrupted VMs from a network. Network security virtualization has two main functions: (i) transparently transmit network flows to desired security devices, and (ii) allow security formulas in network devices when required. Software-Defined Networking (SDN) is an evolving network technique that allows management network flows and tracks for overall network status efficiently. Five main functions of NETSECVISOR. (i) System and policy manager, (ii) Routing rule generator, (iii) Flow rule enforcer, (iv) Response manager, and (v) Data manager. A cloud administrator must use a simple script language that requires (i) system ID, (ii) device form, (iii) device position, (iv) device mode, and (v) supported functions to register existing security devices with NETSECVISOR to use them. After registering security devices for a cloud network with NETSECVISOR, it will show the security devices’ details to users using the cloud network. For security requirements, NETSECVISOR should consider the following two factors: (i) network packets should pass through specific security devices, and (ii) The network packet routing paths have to be developed and optimized. NETSECVISOR allows for introducing five security response techniques that do not necessitate installing physical security equipment or improvements to network configurations for packet handling. There are two modes of operation for these methods: passive mode and in-line mode. To check the adequacy and effectiveness of NETSECVISOR, there are three different network topologies, but two are for a virtual network environment, and another is a commercial switch environment. NETSECVISOR can construct a routing path in 1 millisecond, which translates to 1,000 network flows per second. Each topology’s CPU and memory consumption overhead are also assessing. When NETSECVISOR creates routing routes, it adds overhead. A comprehensive cloud network has millions of clients and virtual machines, and each routing path can be generated independently and asynchronously. NETSECVISOR prototype is easy to use, and clients can quickly build their own security rules; users have more choices for system types, traffic types, and response activities. Also, NVS can virtualize security resources and functions and provide security response functions from network devices as needed. 

Reference

Shin, S., Wang, H., and Gu, G. (2015). A first step toward network security virtualization: From concept to prototype. IEEE Transactions on Information Forensics and Security, 10(10), 2236-2249.  https://doi.org/10.1109/TIFS.2015.2453936

Pavel Hlinin’s Expanded Definition of Alternative Energy Sources.

To: Professor Ellis
From: Pavel Hlinin
Date: March 20, 2021
Subject: Expanded Definition

Introduction

For my expanded definition research project, I decided to focus mostly on alternative energy sources. I think that it is a great topic for my term research project because our reality changes rapidly and alternative sources of energy are important now and most likely will increase its importance in future. So, the term alternative energy sources are good term to work on.  Development of economies and globalization increase demand of energy. Many countries experience the shortage of energy at some point. Any national disaster or pandemic show that using only traditional sources of energy, cannot satisfy all needs. That makes the topic of alternative energy sources very important nowadays.

Definitions

According to Cambridge Dictionary, “alternative energy is energy from moving water, wind, the sun, and gas from animal waste” or “ alternative energy is energy that does not come from coal, oil, gas, or wood, especially energy from moving water, wind, the sun, or animal waste”.  According to  the article “Minimizing electricity cost by developing an effective combination of alternative energy sources” gives a more expanded definition of alternative energy term by adding a few more different types of alternative energy sources such as “solar power, industrial batteries, and diesel generators” (Yadavalli, V.S.S., 2020). At the same time a very interesting definition gives the website studentenergy.org. According to this website: “alternative energy refers to energy sources other than fossil fuels. This includes all renewable sources and nuclear” (studentenergy.org, 2020). That is interesting because usually a nuclear source of powers refers to traditional sources of energy.

Context

The article „The Importance of Renewable Energy Sources in Poland’s Energy Mix” written by polish researchers, tells us about the importance of renewable energy sources and gives extended explanation what is renewable and alternative energy sources. This article explains in detail which renewable and alternative energy sources exist and how it works. For example, the article says that alternative sources of energy are energy generated from solar radiation, wind energy, biomass, water, and geothermal sources. According to this article, “renewable sources of energy come in an unlimited supply, they do not emit greenhouse gasses into the atmosphere, or only a negligible amount thereof, and they are less expensive than the conventional sources” (Marks-Bielski, Bielski, Pik, & Kurowska, 2020). The author refers the alternative energy to the term green energy. In Poland, the green energy presented by energy which is based on biofuels (80%) and wild energy (12%). Also, there are few other examples of green energy such as “energy originates from waterpower (2%), biogas (2.88%), and solar power (0.68%), and trace amounts of energy come from incineration of municipal waste, geothermal springs, and heat pumps” (Marks-Bielski, Bielski, Pik, & Kurowska, 2020). S.A. Dyatlov, in his article “Prospects for alternative Energy Sources in Global Energy Sector” , discuss various of alternative energy sources and their importance nowadays. Also, he tells why alternative sources of energy cannot fully compete with traditional sources. Mainly it is because this energy remains very expensive for the end user due to the inclusion of various environmental tariffs and fees in the price” (Dyatlov, 2020).

 Working Definition

The definition of the alternative renewable sources of energy is extensive and includes many components. However, all resources give approximately the similar definition. Thus, alternative and renewable energy sources are represented primarily by installations or devices that use the energy of the sun, wind, water, geothermal energy, or energy contained in water, air, or earth. In recent years, interest in alternative energy sources has been growing steadily. Their use is especially important in remote areas. Also, alternative energy sources have less negative impact on the environment in most cases. The alternativeity of these sources lies in the fact that today these sources are used as alternative sources to traditional sources in conditions when the use of traditional energy sources is not possible for any reason. The renewability of energy sources lies in the fact that, as a rule, these sources work cyclically and are restored to their own without additional help. The good examples of renewability give solar and wind energy sources.

      

References

Alternative energy. (n.d.). Retrieved February 24, 2021, from https://dictionary.cambridge.org/us/dictionary/english/alternative-energy

Yadavalli, V.S.S (2020, December).   Minimising electricity cost by developing an effective combination of alternative energy sources. South African Journal of  Industrial Engineering. p.168

Marks-Bielski, R.,  Bielski, S.,  Pik, K., & Kurowska, K. (2020). The Importance of Renewable Energy Sources in Poland’s Energy Mix. https://go-gale-com.citytech.ezproxy.cuny.edu/

Dyatlov, S., Didenko, N., Ivanova, E., Soshneva, E., & Kulik, S. (2020, January 01). Prospects for Alternative Energy Sources in Global Energy Sector. S.A. Dyatlov et al 2020 IOP Conf. Ser.: Earth Environ. Sci. 434 012014. Iopscience. Retrieved March 15, 2021, from https://iopscience.iop.org/article/10.1088/1755-1315/434/1/012014

Edward Dominguez’s Expanded Definition of Artificial Intelligence (AI)

TO: Prof. Jason Ellis
FROM: Edward Dominguez
DATE: MARCH 26, 2021
SUBJECT: Expanded Definition of Artificial Intelligence (AI)

INTRO

This is an expanded definition that explores the term “artificial intelligence” as a general introduction for undergraduates that are studying computer information technology. I chose the term artificial intelligence because it is relevant in today’s society. In the following document, I discuss several definitions of artificial intelligence, then I compare and contrast different contextual uses of artificial intelligence and finally, I write my own working definition of the term based on these definitions and contextual examples.

DEFINITION

“The capacity of computers or other machines to exhibit or simulate intelligent behaviour; the field of study concerned with this. Abbreviated AI.” (McGraw-Hill, 1977). In this definition, artificial intelligence is the magnitude of machines that can show intelligent behavior.

“Computer systems that can perform intelligent human tasks, such as decision-making. Intelligence demonstrated by machines, in contrast to the natural intelligence displayed by humans and other animals. In some cases artificial intelligence is applied when a machine mimics cognitive functions that humans associate with other human minds, such as learning and problem-solving.” (Oxford University Press, 2020). In this definition, artificial intelligence is defined as computer systems that can accomplish complex human tasks. Also, artificial intelligence can be applied to machines that copy cognitive functions that are associated with the human mind. Certain tasks that machines are able to do can be defined as artificial intelligence, include learning, decision-making, and problem-solving. This definition relates to the previous definition of (McGraw-Hill, 1977), the particular reason for this circumstance is both definitions state that artificial intelligence is when machines are able to replicate intelligent behavior. One may use this definition (Oxford University Press, 2020), instead of the previous definition (McGraw-Hill, 1977) because it has a much deeper definition and because more examples of artificial intelligence is given. Even though the first definition was written in 1977, it is still holds up as a valid definition.

CONTEXT

“Amazon.com also groups together people with similar interests and uses all of their data to make better recommendations to the group. The more a person uses any of these services, the better the recommendations get. Users’ actions train the AI to better understand what they like.”(Hulick, 2016). In this quote, the term artificial intelligence is used as a way to show how artificial intelligence learns from the user’s data to figure out what that specific user likes. This shows how AI is being used in our daily lives today. This context relates to the definition of (Oxford University Press, 2020), because AI is learning and picking up things from the user in order to help recommend items for that specific user. This context also relates to the definition of (McGraw-Hill, 1977), because the system is showing intelligent behavior by learning.

“Humans decided to give to driverless cars and many other AI equipped machines the power to make sometimes life-critical decisions. As such, ethical and moral dimensions must be taken into consideration and attention given to this aspect. Furthermore, if we are even capable of making an algorithm which will be able to use ethical patterns of humans” (Nikolic, Yang, 2020). The context uses the term “artificial intelligence” as technology that is being used today to make life or death decisions. The important decisions that artificial intelligence has to make and the consequences if something goes wrong, makes us questions if AI like this, is morally right to have in society. The context’s use of artificial intelligence also relates to the second definition (Oxford University Press, 2020) where AI can perform intelligent human tasks such as a driverless car. The way artificial intelligence is used in this context relates to the last context of (Hulick, 2016) where artificial intelligence is used by companies to help users find recommendations for items online while in the context of (Nikolic, Yang, (2020) artificial intelligence is used to make driverless cars. Both contexts show different ways artificial intelligence can be used to help people. Although artificial intelligence can help many people, it can also raise many questions about how ethical and moral due to the fact that many things that errors and mistakes can happen, especially because AI technology still isn’t

WORKING DEFINITION

            Artificial intelligence is when machines are able to learn on their own to make complex decisions that mimic human intelligence such as learning, problem solving and much more.  Artificial intelligence can be found everywhere in today’s society, we use it every time we use our smartphones, media applications, and much more. We are becoming more and more dependent to artificial intelligence. As time progresses, artificial intelligence will continue to grow. AI technology is important now and will become even more important in the future.

References

Gorse, C., Johnston, D., & Pritchard, M. (Eds.). (2020). A Dictionary of Construction, Surveying and Civil Engineering (2 ed.). Oxford University Press Retrieved March 4, 2020, from  https://www.oxfordreference.com/view/10.1093/acref/9780198832485.001.0001/acref-9780198832485-e-8189?rskey=7AdcY1&result=1

Hulick, K. (2016). Artificial intelligence . Essential Library

McGraw-Hill. (1977). Oxford English Dictionary. Retrieved March 4, 2021, https://www-oed-com.citytech.ezproxy.cuny.edu/view/Entry/271625?redirectedFrom=artificial+intelligence#eid

Nikolic, P. K., & Yang, H. (2020). Artificial Intelligence Clone Generated Content toward Robot
Creativity and Machine Mindfulness. Mobile Networks & Applications, 25(4), 15041513. https://doi-org.citytech.ezproxy.cuny.edu/10.1007/s11036-019-01281-z

Motahear Hossain’s Expanded Definition of Artificial Intelligence (AI)

TO: Prof. Jason Ellis.
FROM: Motahear Hossain.
DATE: 03/26/2021.
SUBJECT: Expanded Definition of Artificial Intelligence (AI).

INTRODUCTION

The purpose of this 750-1000 Word Expanded Definition is to provide all the possible meanings of a scientific term, which is related to modern-day technology and associated with my college major. In this following document, I will be defining the term “Artificial Intelligence,” including the possible meanings and usages of that term. I will also explore the word history of this term, explain peculiarities of its uses, and offer examples of this term. To provide examples, I will address and discuss several definitions and quotations from verified sources and discuss, compare, and contrast those definitions and quotes from the different authors. Conclusively, I will provide my practical explanation of the term throughout this learning process.

DEFINITIONS

According to the Oxford English Dictionary, the word “Artificial Intelligence” is a noun, connecting with two separate arguments, artificial adj. + intelligence n. They define “Artificial Intelligence” as “The capacity of computers or other machines to exhibit or simulate intelligent behavior; the field of study concerned with this” (American Psychological Association. (n.d.)). Based on this definition, the meaning of artificial intelligence is a computer or machine capable of presenting itself or work on its own and replicate a job called artificial intelligence.
In another source, the World Encyclopedia describes “Artificial Intelligence (AI)” as “Science concerned with developing computers and computer programs that model human intelligence. The most common form of AI involves programming a computer to answer questions on a specialized subject. Such ‘expert systems’ are said to display the human ability to perform expert analytical tasks. A similar system in a word processor may highlight incorrect spellings and be ‘taught’ new words. A closely related science, sometimes known as ‘artificial life,’ is concerned with more low-level intelligence” (Philip, 2014). Unlike Oxford English Dictionary, this is a broader approach of definition. Encyclopedias compare artificial intelligence with the human brain and designation it ‘artificial life.’ They state it will work by a set of programs and made for a specialized subject. It can provide the correct answer, detect the wrong answer, and suggest better options based on the system (AI) is working.

CONTEXT

According to Rockwell Anyoha (August 28, 2017), “In the first half of the 20th century, science fiction familiarized the world with the concept of artificially intelligent robots. It began with the “heartless” Tin man from the Wizard of Oz and continued with the humanoid robot that impersonated Maria in Metropolis.” In his blog post, the writer wrote the history of the concept of artificially intelligent robots or robotic systems. Anyoha claims that Alan Turing was the person who saw the possibility of artificial intelligence. If humans can solve the problem and make the decision, Turing thought, why not a machine? Besides, blogger claims most scientists, mathematicians, and philosophers were optimized for the potential possibility of artificial intelligence around the turn of the twentieth century and started work on the program. It began with cracking the ‘Enigma’ code used by German forces during the Second World War. But as technology advances, earlier standards that defined artificial intelligence become outdated. These days the artificial intelligence (AI) is developing to benefit many different industries, so the meaning of artificial intelligence (AI) has become much broader.
In the article “Artificial Intelligence in the 21st Century” J. Liu et al. states that “Due to the historical development, AI has been utilized into several major subjects including computer vision, natural language processing, the science of cognition and reasoning, robotics, game theory, and machine learning since the 1980s.” (2018, p. 34403). As J. Liu et al. has indicated, artificial intelligence is not just defining a particular sector in the technology industry; nevertheless, it is much broader than we think. Nowadays, artificial intelligence is applying in every segment. For instance, computer vision of object recognition is the process of identifying the picture or object. Using computer vision, we can analyze any blurred images, read a map, or recognize substances like fingerprints. In the same ways for home and industrial security purposes, some companies use a security camera with installing facial recognition software. The same software can be used in a drone for shipping purposes or detecting criminal activities.
According to an article in the New York Times, “Police Drones Are Starting to Think for Themselves” Metz C. states that “In Chula Vista, drones are already an integral part of the way the police respond to emergencies. After an emergency call comes in, officers give the drone a location, and it flies to that point on its own — before returning on its own, too.” In the article, Metz also mentioned that Chula Vista is the first city in the world to use drones as first responders. Since the program began two years ago, Chula Vista police have used drones to respond to up to 15 emergency calls a day, totaling over 4,100 flights. This report suggests that artificial intelligence drones are now taking the place of human cops, and they are performing even better. This drone is a perfect example of artificial intelligence in action. It has the ability to deliberate and make decisions that are most likely to result in the achievement of a particular objective.

WORKING DEFINITION

After going through all of the concepts, quotes, and learning from college courses, I have concluded that Artificial Intelligence is a clone of the human mind that is programmable as an algorithm and applied to machines to operate and run software without human intervention. If it can deliberate and take decisions that have the best chance of achieving a particular goal, it will be an ideal trait. Artificial intelligence would be advantageous to us in the future. It is something to be utilized in a wide range of industries and sectors.

REFERENCES

American Psychological Association. (n.d.). Artificial intelligence. In Oxford English Dictionary. Retrieved February 19, 2021, from https://www-oed-com.citytech.ezproxy.cuny.edu/view/Entry/271625?redirectedFrom=artificial+intelligence#eid.

Philip’s. (2014). Artificial intelligence. In World Encyclopedia. Retrieved February 19, 2021, from https://www-oxfordreference-com.citytech.ezproxy.cuny.edu/view/10.1093/acref/9780199546091.001.0001/acref-9780199546091-e-684?rskey=0VcIwl&result=9.

Anyoha, R. (August 28, 2017). The History of Artificial Intelligence. Retrieved from https://sitn.hms.harvard.edu/flash/2017/history-artificial-intelligence/.

J. Liu et al. (2018). Artificial Intelligence in the 21st Century. IEEE Access, 6, 34403-34421. https://doi.org/10.1109/ACCESS.2018.2819688.

Metz, C., (December 5, 2020). Police Drones Are Starting to Think for Themselves. The New York Times. https://www.nytimes.com/2020/12/05/technology/police-drones.html?searchResultPosition=16