Angel Rojas Expanded Definition of Virtualization

TO: Prof. Ellis  

FROM: Angel Rojas  

DATE: 04/11/2021  

SUBJECT: Expanded Definition of Virtualization

Introduction

The scientific term I decided to write this expanded definition was Virtualization. I will be discussing virtualization on desktop computers and laptops. The following will define the term in a way that someone who isn’t familiar with the technology can understand and how it can also be used in their everyday life. As this type of technology is now more available to the public, people have yet realized the possibilities that can be produced. Such as being an owner of a company you can use this resource to increase your workflow or minimize cost on resources for your workers.

Definition

“Virtualization has been a part of the computing landscape for nearly half a century. In the 1960s and 1970s, IBM developed the Control Program/ Cambridge Monitor System (CP/CMS) which led into VM/370. These systems let each user run what appeared to be an isolated system, but all within one timeshared computing environment.”

When we think about virtualization the term virtual comes to mind. In the field of technology we want to bring out the most we can possible with little hardware in physical space. Throughout the years the technology has advanced that not only enterprise grade hardware was the only ones capable of utilizing the technology but also the consumer market now has a chance to provide the tech. This is due to chips providing more cores allowing more power for the average person as technology and demand increases.

Virtualization can go beyond software as hardware virtualization has been more effective due to advances in technology allowing hardware sharing. Including the huge boost in cloud services this feature has be enabled in many devices as long as its connected to the internet you can have access to many services by different distributors.

Context

            As of the beginning of the year 2020 the COVID-19 pandemic as created a lot of educational struggles for many students of all grades including college. This has lead to the start of remote learning as students couldn’t go physically. However resources had to be shared in some form of being accessible by everyone no matter the current situation. 

 â€śAt present, virtualization and virtualization technology represent a powerful tool for the consolidation and simplification of vast hardware and software structures administration. Their potential is extensive, considering their employment; they are used in numerous branches and fields. It is therefore logical that the issue of virtualization technology is becoming a priority for educational institutions not only in terms of their internal information systems, but also as a means of solving particular educational issues regarding advanced administration and operation of information systems.”

In the article “Virtualization for computer networking skills development in a distance learning environment” this is presented as before the pandemic Virtualization has been proven to be a strong tool for such case, to remotely share resources to people around the world with minimal space as it can be hardware sharing and software sharing through the cloud. Organizations have services established.

“The technology itself is not only a matter of server virtualization (or client workstations), as individual applications may be virtualized as well.”

The quote is from Milan Klement’s article “Models of integration of virtualization in education: Virtualization technology and possibilities of its use in education“ As the article includes details on how what type of virtualization an organization can set up for students and what tools the faculty could expect to use to provide more insight in providing low level IT skills to people who wouldn’t need such advanced tools.

Working Definition

Virtualization is a form of technology enhancement that has been around for decades and has enabled a multitude of features such as software sharing and also hardware sharing, minimizing the amount of physical hardware needed to connect multiple people to a single device.

Sources Cited

Donelan, H., Smith, A., & Wong, P. (2018). Virtualization for computer networking skills development in a distance learning environment. Computer Applications in Engineering Education, 26(4), 872–883. https://doi.org/10.1002/cae.21928

Klement, M. (2017). Models of integration of virtualization in education: Virtualization technology and possibilities of its use in education. Computers and Education, 105, 31–43. https://doi.org/10.1016/j.compedu.2016.11.006

Douglis, F., & Krieger, O. (2013). Virtualization. IEEE Internet Computing17(2), 6–9. https://doi.org/10.1109/MIC.2013.42

Mohammad Amin’s Expanded Definition of Cyber Security.

TO: Prof. Jason Ellis
FROM: Mohammad Amin
DATE: Due Date
SUBJECT: Expanded Definition of Cyber Security
 
Introduction 
I going to discuss abut cyber security. I’m defining cybersecurity term. I’m going to give definition and quotation to explain this term. In the following document I’m going to discuss definition and provide quotes. And finally, I’ll explain all of this in working definition in my own words.     
 
Definitions
The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this:  some people have argued that the threat to cybersecurity has been somewhat inflated.
 
This definition means to prevent unauthorized persons from accessing electronic data and to protect all data from attacks by unauthorized persons.
 
Cybersecurity changes over time and these changes are different with a more complete understanding of cybersecurity self-efficacy and engagement trends.
 
This definition means, The type of cyber-attack changes over time so the type of cyber security also has to change. To protect against cyber-attacks, cyber security has to be modified and improved day by day. In order to increase their cybersecurity level in their own place.
 
Similar: The two definitions are to take appropriate action to prevent the theft of any information or the use of any information without permission. And cyber security needs to be updated over time. And ensure cyber security.
The first definition protects against criminal or unauthorized use of electronic information, and the second deals with changes in deals and the self-efficacy of cybersecurity over time.
 
Context


With the advent of electronic voting, some cybersecurity experts worry elections can too easily be rigged. Here Electoral System Electronics Cyber security experts fear that the polls could be rigged easily. I have found this context quote on this Book call Cybersecurity.
 
“The existing cyber-side and physical-side security defense systems are relatively isolated. For cyber-attacks, the main approaches to situation awareness and defense are executed at the cyber side, whereas the physical side has not been actively involved in these efforts. In many circumstances, state information of the physical side of the system can assist in the identification and traceback of cyber-attacks. The measures at the physical side can help prevent or reduce the risk caused by cyber-attacks.” This quote means Cyber ​​protection It cannot be physically provided. It has to be defended online to protect against online attacks. Situation awareness is implemented on the defensive side which can help in overall cyber security information cyber-attack detection and identification. Physical state information can help in the detection and identification of cyber-attacks. Physical measures help prevent or reduce the risks posed by cyber-attacks. I have found this quote from “Concept and Research Framework for Coordinated Situation Awareness and Active Defense of Cyber-Physical Power Systems against Cyber-Attacks,” 

Similar: In both cases there is a complete lack of cyber security where there is a lot of risk involved
Electronic voting has been mentioned in the first conflict where experts fear that if cyber security is not increased here, then the results of electronic voting may change. There is talk of rigging here
In the second conflict, it was stated that cyber security’s defense system should be physically and informally aware of cyber-attacks so that they do not undergo cyber-attacks in any process. Helps to reduce the risk caused.

Working definition

Cyber ​​security is the act of preventing someone from stealing a document or misrepresenting information online without someone’s permission. Taking any information from the file without permission is called cyber-attack. And cybersecurity is about preventing anyone from taking information without permission.

Reference:
https://www-oxfordreference-com.citytech.ezproxy.cuny.edu/view/10.1093/acref/9780199571123.001.0001/m_en_gb0994436?rskey=5p9BbD&result=5
 
L. C. Amo, R. Liao, E. Frank, H. R. Rao and S. Upadhyaya, “Cybersecurity Interventions for Teens: Two Time-Based Approaches,” in IEEE Transactions on Education, vol. 62, no. 2, pp. 134-140, May 2019, doi: 10.1109/TE.2018.2877182.
Higgins, Melissa, and Michael Regan. Cybersecurity, ABDO Publishing Company, 2015. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/citytech-ebooks/detail.action?docID=5262186.
Created from citytech-ebooks on 2021-03-09 12:24:53.
 
Cite: M. Ni, M. Li, J. Li, Y. Wu and Q. Wang, “Concept and Research Framework for Coordinated Situation Awareness and Active Defense of Cyber-Physical Power Systems against Cyber-Attacks,” in Journal of Modern Power Systems and Clean Energy, doi: 10.35833/MPCE.2018.000830.