Expanded Definition of Artificial Intelligence

Expanded Definition of Artificial Intelligence

TO: Prof. Jason Ellis

FROM: Neil Domingo

DATE: 3/30/21

SUBJECT: Expanded Definition of Artificial Intelligence

Introduction

The purpose of this document is to further explore and define the term Artificial Intelligence. The term would be discussed by expanding the general definition of Artificial Intelligence. First, this document will define the term with its definitions. Then, this document will provide context for the given definitions. Lastly, this document will provide a working definition of the term of Artificial Intelligence. 

Definitions

Artificial Intelligence is defined by Britannica as “the ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings” [1]. This definition is a simple definition best for those that are unaware of what the term means. the definition given by Britannica, defines Artificial Intelligence simply as a “computer” or “robot” that performs tasks associated with “intelligent beings”. This definition is associated with systems that are embedded with “intellectual processes” with characteristics of humans. These characteristics include “ability to reason, discover meaning, generalize or learn from past experiences”. [1] Another definition that is similar to the Britannica definition of Artificial Intelligence is given in an article entitled Artificial intelligence-definition and practice.  The article defines Artificial Intelligence as “The term artificial intelligence denotes behavior of a machine which, if a human behaves in the same way, is considered intelligent” [2]. In this definition, a system, computer, or robot would be considered as a machine. Then, the definition states that the machine would display a behavior that is considered “intelligent”. It is only considered intelligent if it behaves in the same way as a human. There is another definition that is similar to the two given. A journal article entitled, Artificial intelligence, machine learning and deep learning: definitions and differences, refers Artificial Intelligence “to a field of computer science dedicated to the creation of systems performing tasks that usually require human intelligence” [3]. This given definition is similar to the others as it discusses systems and human intelligence. Systems are considered as machines or computers act in a way of a human. 

Human intelligence refers to a “mental quality that consists of the abilities to learn from experience, adapt to new situations, understand and handle abstract concepts, and use knowledge to manipulate one’s environment” [4].  All three definitions of Artificial Intelligence given are all similar as they define Artificial Intelligence as a machine or a computer/system that perform tasks in such fashion with characteristics of a human.  In simplest terms, a computer that acts or thinks like a human. One might lean towards the definition given in Artificial intelligence-definition and practice, because it best describes the machine denoting a behavior in a way of a human. 

Context

The term Artificial Intelligence is found in many journals such as Artificial Intelligence in the 21st Century. The journal discusses Artificial Intelligence and its growth throughout the 21st century. The journal utilizes different journals and conferences to dig into the impactful evolution of Artificial Intelligence. The journal states, “In simple terms, AI aims to extend and augment the capacity and efficiency of mankind in tasks of remaking nature and governing the society through intelligent machines, with the final goal of realizing a society where people and machines coexist harmoniously together” [5]. The purpose of Artificial Intelligence is to further extend the limitations of how tasks are executed and greatly increase the capacity and efficiency of these tasks. Ultimately, it will reshape nature and society that would lead to a world where humans and machines such as computers/robots can work together as a “well oiled machine”. Another journal entitled AIR5: Five Pillars of Artificial Intelligence Research discusses Artificial Intelligence and its five pillars. The five pillars of Artificial Intelligence are rationalizability, resilience, reproductivity, realism, and responsibility. The journal states that the five Rs “represent five key pillars of AI research that shall support the sustained growth of the field through the 21st century and beyond” [6]. The journal discusses how these five pillars are essential in maintaining the growth of Artificial Intelligence. The journal also states “The original inspiration of artificial intelligence (AI) was to build autonomous systems capable of matching human-level intelligence in specific domains” [6]. The intentions of Artificial Intelligence was to build a system that can match human intelligence in specific aspects. A blog entitled Artificial Intelligence in Medicine: Applications, implications, and limitations, discusses how Artificial Intelligence can be used in medicine. The blog also states “AI algorithms also must learn how to do their jobs. Generally, the jobs AI algorithms can do are tasks that require human intelligence to complete, such as pattern and speech recognition, image analysis, and decision making. However, humans need to explicitly tell the computer exactly what they would look for in the image they give to an algorithm, for example. In short, AI algorithms are great for automating arduous tasks, and sometimes can outperform humans in the tasks they’re trained to do” [7]. This quote details the capabilities of Artificial Intelligence and what it must do to be effective. Artificial Intelligence must learn algorithms and read data in order to produce results that are useful. However, they must be told what to do by a human. Once they learn their tasks, they can have the potential to outperform humans, as if “beating them at their own game”.

Working Definition

Artificial Intelligence is the ability of a computing machine such as a computer to learn algorithms and interpret data in order to perform tasks of a human’s capability.  Artificial Intelligence can have the potential to troubleshoot problems of a human’s computer or a computer in general. Artificial Intelligence can also have the potential ability of solving a human’s computer through a series of questions and ultimately lead to a solution. 

References

  1. Copeland, B. (2020, August 11). Artificial intelligence. Encyclopedia Britannica. https://www.britannica.com/technology/artificial-intelligence
  2. A. B. Simmons and S. G. Chappell, “Artificial intelligence-definition and practice,” in IEEE Journal of Oceanic Engineering, vol. 13, no. 2, pp. 14-42, April 1988, doi: 10.1109/48.551
  3. D. Jakhar and I. Kaur, “Artificial intelligence, machine learning and deep learning: definitions and differences,” in Clinical and Experimental Dermatology, vol. 45, issue 1, pp. 131-132, June 2019, doi:10.1111/ced.14029
  4. Sternberg, R. J. (2020, November 6). Human intelligence. Encyclopedia Britannica. https://www.britannica.com/science/human-intelligence-psychology
  5. Liu, Jiaying & Kong, Xiangjie & Xia, Feng & Bai, Xiaomei & Wang, Lei & Qing, Qing & Lee, Ivan. (2018). Artificial Intelligence in the 21st Century. IEEE Access. PP. 1-1. 10.1109/ACCESS.2018.2819688
  6. Ong, Yew & Gupta, Abhishek. (2018). AIR5: Five Pillars of Artificial Intelligence Research. 
  7. Ariel, et al. “Artificial Intelligence in Medicine: Applications, Implications, and Limitations.” Science in the News, 19 June 2019, sitn.hms.harvard.edu/flash/2019/artificial-intelligence-in-medicine-applications-implications-and-limitations/.

Expanded Definition of Artificial Intelligence (AI)

TO: Prof. Jason Ellis
FROM: Chowdhury Hashmee
DATE: March 26th, 2021
SUBJECT: Expanded Definition of Artificial Intelligence

INTRODUCTION

The purpose of this 750-1000 Word Expanded Definition is to explore the definition of the term “Artificial Intelligence” which is a revolutionary invention of science in modern-day technology. I will be defining the term “Artificial Intelligence” in relation to machine learning and contextually how it operates in the different sections of the modern technology field. 

In this project, I will introduce Artificial Intelligence following several defining quotations from verified sources where I will discuss and compare those definitions from the authors. Next, I will discuss several quotations from a variety of sources where Artificial Intelligence is used in context. Finally, I will provide my own working definition of Artificial Intelligence after discussing all those quotations.

DEFINITIONS

Author  J. F. SMOLKO in the article “ARTIFICIAL INTELLIGENCE” defines AI as, “Artificial intelligence (AI) is that division of science, particularly of computer science, which attempts to emulate and extend with programmed and fabricated elements the cognitive and affective functions of animals and human beings.”(Smolko, 2003, p.765). Author SMOLKO tries to define Artificial Intelligence as the emulation of cognitive and affective functions that animals and we, humans perform daily. However, he emphasized computer science since machines will think and perform as the human mind thinks by using algorithms which is programmable by AI. In another article “BUSINESS FINANCE”, authors  Mark Jon Snyder and Lisa Gueldenzoph Snyder define AI as, “Artificial Intelligence (AI) is the branch of computer science and engineering devoted to the creation of intelligent machines and the software to run them. This process is “artificial” because once it is programmed into the machine, it occurs without human intervention.”(Snyder et al., 2014, p.31). Comparing the two definitions, all of the authors mention computer science and programmable algorithms that machines will learn to think like human minds also known as Artificial Intelligence. The author from the first definition didn’t mention human intervention whereas the authors of the second definition did which means when machines adopt programmable AI, they can operate and run the software simultaneously without human interventions.

CONTEXT

In a New York Times article “After the Pandemic, a Revolution in Education and Work Awaits” by  Thomas L. Friedman in an interview with Ravi Kumar, Artificial Intelligence is described as an automated system. “Now so many more people can play at that because you no longer need to know how to code to generate new software programs. Thanks to artificial intelligence, there is now “no-code software.’’ You just instruct the software to design some code for the application that you’ve imagined or need and, presto, it will spit it out.”(Friedman, 2020). Basically, the author gathered information about how AI is making our lives easier in the job sectors where AI will automate generate code according to the instruction given by the user whereas before we had to write all the codes from the scratch and as a human being, it takes up a lot of time to complete an application to run properly. In a blogpost “AI is Shaping the Future of Appointment Scheduling” posted by Ryan Williamson explains the importance of  AI in scheduling appointments. “AI-driven interface between the customer and the company can schedule appointments without human intervention to enable sending out confirmation emails, digital directions, etc. to help deliver a top-notch experience every time.”(Williamson, 2020). Ryan emphasizes an AI-driven interface where customers can schedule an appointment, collect basic pieces of information such as FAQ instead of calling the customer service, waiting in line, and manually schedule an appointment which is beneficial for both business and customers. Since an AI-driven interface can operate multiple tasks at the same time, the company can reduce labor and invest more in technology. In a CBS NEWS article “Facebook touts the use of artificial intelligence to help detect harmful content and misinformation” by Musadiq Bidar, he explains how Facebook is using AI to detect posts that violate the company’s policies and regulations. “Confronted with an onslaught of social media posts filled with misinformation and harmful content, Facebook said Tuesday it has begun to rely on artificial intelligence to boost its efforts to evaluate whether posts violate its policies and should be labeled or removed.”(Bidar, 2020). Billions of people use Facebook every day but not everyone follows the guidelines and policies. It is not possible for Facebook employees to manually detect and take down all those posts. Therefore, Facebook is using AI that can intelligently detect the violating posts and can track the devices from where the posts have been published all thanks to the programmable algorithms in combination with machine learning. Human eyes can make mistakes, but we cannot escape with violations through the eyes of AI.

WORKING DEFINITION

From the above discussions, I think Artificial Intelligence is the counterfeit of the human mind which is programmable to apply as an algorithm into the machines to operate and run software without human interruption. AI is very important in my major(software development) since developers use the help of AI to generate automated codes that will provide time to the developers in the backend to debug and test the application while the frontend developers can modify those automated codes according to the requirements without starting from scratch.

REFERENCES,

Bidar, M. (2020, August 12). Facebook touts use of artificial intelligence to help detect harmful content and misinformation. CBS News. https://www.cbsnews.com/news/facebook-artificial-intelligence-harmful-content-misinformation/. 

Friedman, T. L. (2020, October 20). After the Pandemic, a Revolution in Education and Work Awaits. https://www.nytimes.com/2020/10/20/opinion/covid-education-work.html?searchResultPosition=1. 

Williamson, R. (2020, October 6). AI is Shaping the Future of Appointment Scheduling. Data Science Central. https://www.datasciencecentral.com/profiles/blogs/ai-is-shaping-the-future-of-appointment-scheduling. 

SMOLKO, J. F. (2003). Artificial Intelligence. In New Catholic Encyclopedia (2nd ed., Vol. 1, pp. 765-766). Gale. https://link.gale.com/apps/doc/CX3407700832/GVRL?u=cuny_nytc&sid=GVRL&xid=bb763593

Snyder, M. J., & Snyder, L. G. (2014). Artificial Intelligence. In Encyclopedia of Business and Finance (3rd ed., Vol. 1, pp. 31-35). Macmillan Reference USA. https://link.gale.com/apps/doc/CX3727500026/GVRL?u=cuny_nytc&sid=GVRL&xid=fa612e0a

Expanded Definition of Amazon Web Service (AWS)

TO: Prof. Ellis 
FROM: Andrew Dindyal 
DATE: 3/26/21 
SUBJECT: Expanded Definition of Amazon Web Service (AWS)

Introduction

Although Amazon.com Incorporation is most popularly known as a web-based retail and logistics company, one of its products, Amazon Web Services has become an essential resource for several organizations across various technological industries (Amazon Web Services Inc. 2021). This paper defines Amazon Web Services and what it entails together with its relevance. This paper analyzes Amazon Web Services within a commercial context as well as in relation to the future of information technology to add more perspectives. I attempt to outline the connection between Amazon Web Series and my major in Computer Systems through a working definition.

Definitions

Amazon Web Services is a multi-faceted web-based program that provides a “leading cloud-computing platform” to its clients worldwide (Page, 2020). “Cloud-computing” refers to a service that enables the client to preserve and freely obtain “data” online without the client having to use “hard drives” (Guru99, 2021). Similarly, Guru99 (2021) defines Amazon Website Services as “a platform that offers flexible, reliable, scalable, easy-to-use and cost-effective cloud computing solutions.” Moreover, the Amazon Web Services Inc. (2021) website defines it as “the world’s most comprehensive and broadly adopted cloud platform.” As such, all these definitions acknowledge that Amazon Web Services avails “cloud-computing” services, which allow one to retrieve the information from “remote servers” (Guru99, 2021). “Remote servers” are computers that provide access to “files” for “users that are not on a Local Area Network but need remote access to it, such that the users gain access to files and print services on the Local Area Network from a remote location” (The Law Dictionary, n.d.). Only the Amazon Web Services Inc. (2021) website mentions the global use of Amazon Web Services in its definition. In simple terms, therefore, Amazon Web Services is a collection of facilities provided by Amazon Inc. through which customers can preserve and retrieve web-based information and other materials from numerous locations worldwide at any time (Amazon Web Services Inc., 2021).

Amazon Web Services includes various products that feature capabilities such as “analytics, application integration, block-chain, cost-management, computing facilities, machine learning, networking and content delivery, storage, and databases” (Amazon Web Services Inc., 2021). These products are currently being applied to identify better ways of enhancing the availability of information to more customers globally (Amazon Web Services Inc., 2021).

Contexts

Within a commercial context, Amazon Web Services has been successful in expanding its utilization to more customers around the world, by creating a diverse and vast customer base (Amazon Web Services Inc., 2021). Herrman (2021) explains that “If you watch Netflix, or if you have a meeting on Zoom, or if you check Pinterest, or scroll through Twitter”, then you are most likely using facilities provided by Amazon Web Services. This implies that in the current technological era, facilities that allow for unlimited preservation and retrieval of web-based information are relevant in almost every sphere of our lives. Organizations that can optimally use such facilities are guaranteed a competitive advantage in their industries. This speaks to the commercial success of Amazon Web Services since it is currently filling gaps in industries such as “advertising and marketing, financial service providers, manufacturing, popular media and entertainment, telecommunications, travel and hospitality, manufacturing, electronic game technologies, and healthcare” (Amazon Web Services Inc., 2021).

The future, demands that we identify faster, cheaper, and more convenient means of preserving and retrieving web-based information. Amazon Web Services can be recognized as a trendsetter in this endeavor due to their dedication and continued research aimed at improving their product portfolio (Amazon Web Services Inc., 2021). Cook (2018) argues that “the challenge for Amazon Web Services in the coming years will be to accelerate the development of its functionality while increasing the level of security offered to customers”. This implies that there are various barriers in optimizing the availability of web-based information posed mainly by internet users. Furthermore, the ethical and legal boundaries surrounding web-based information availability are currently not clearly defined. So, to enhance the safe preservation and retrieval of web-based information, adequate international regulations and guidelines may be necessary.

Working Definition

Amazon Web Services is associated with my major in Computer Systems because it provides an example of one of the most relevant contemporary uses of Information Technology systems. Fundamentally, Amazon Web Services has set the pace for profitable and efficient utilization of Information Technology facilities by organizations, by relating with my major through laying the foundation for enhanced preservation and retrieval of web-based information. It has also informed us of the current barriers to optimizing the availability of web-based information, thereby directing us on the measures that can be taken for future improvements. Also, since my major in Computer Systems encompasses how information technology can be profitably used in a business setting, Amazon Web Services is an exceptional benchmark from which we can learn how to better apply information technology in providing an organization with a competitive advantage over its opponents. Amazon Web Services are a group of information technology products aimed at enhancing the preservation and retrieval of web-based information.

References

Amazon Web Services Inc. (2021). What is AWS? https://aws.amazon.com/what-is-aws/

Cook, B. (2018, July). Formal reasoning about the security of amazon web services. In International Conference on Computer Aided Verification (pp. 38-47). Springer, Cham.

Guru99. (2021). What is AWS? Amazon Cloud Services Tutorial. https://www.guru99.com/what-is-aws.html

Herrman, J. (2020) What, Exactly, Is Amazon Web Services? The New York Times. https://www.nytimes.com/2021/02/09/style/amazon-web-services.html

Page, V. (2020). What Is Amazon Web Services and Why Is It so Successful? Investopedia. https://www.investopedia.com/articles/investing/011316/what-amazon-web-services-and-why-it-so-successful.asp

The Law Dictionary. (n.d.). What is REMOTE SERVER? https://thelawdictionary.org/remote-server/#:~:text=A%20server%20that%20is%20dedicated,LAN%20from%20a%20remote%20location

Kiara Candelario’s Expanded Definition of Database

To: Prof. Jason Ellis

From: Kiara Candelario

Date: March 26, 2021

Subject: Expanded Definition of Database

Introduction

The purpose of this document is to provide an expanded definition of the word “database.” I have chosen the word database because it has such an impact on our lives without us realizing it. Two definitions of the word database will be provided and will be compared. Also, two instances of the word being used will be provided and compare how the individuals are using the word. Lastly, a working definition is created based on the previous definitions and the context.

Definitions

According to Oxford Dictionary, a database is “A structured set of data held in computer storage and typically accessed or manipulated by means of specialized software.” (Oxford, 2021) The definition explains that it is an organized set of data that can be manipulated, stored, or accessed on a computer. The specialized software stated in the definition used to access and manage the data in a computer is called a database management system (DBMS). They are many database management systems that are used for databases. Some of the database management systems are MySQL, Oracle, Microsoft SQL Server, and PostgreSQL

According to Merriam-Webster, a database is “a usually large collection of data organized especially for rapid search and retrieval (as by a computer).” (Merriam-Webster,2021) The definition explains that it is a large amount of organized data that is accessible with the use of a computer. When searching for the data, it is searched and retrieved quickly. Databases make retrieving data faster. It is efficient for companies that have large amounts of data that need to be stored as well as accessed for future use and reference. For example, doctors can quickly get access to their patient information due to it being held on a database.

The Oxford Dictionary and Merriam-Webster definition both discuss that a database is basically an organized collection of data stored on a computer. Some differences are that the Oxford Dictionary sheds light on how specialized software is needed to manipulate and access the data, which is the use of a database management system. The Merriam-Webster definition sheds light on how large amounts of organized data is access quickly by search and retrieval. Both definitions are used in the technology industry as well as other industries.

Context

Harington states, “for the most part, today’s DBMS is intended as shared resources. A single database may be supporting thousands of users at one time.” Databases have the ability to allow many users to access the information that is in them at once.  It demonstrates how databases are efficient due to a single database supporting thousands of users simultaneously.  Although it allows many users to access the data, it is possible to have security in place so only a restricted number of individuals can access the data. For example, in a company, a database can be limited to specific individuals in order to prevent company breaches.

Randle states, “The Brooklyn district attorney’s office said DNA had helped solve 270 cases, including sexual assaults and homicides. The role of the database became a flash point in the trial of Chanel Lewis, the Brooklyn man convicted in April of murdering Karina Vetrano, a jogger in Queens.” The article discusses how police use a DNA database to capture criminals. The police get DNA samples from a crime scene and run them on the database to see if there is a match. Suppose there is a match, the person whose DNA it corresponds to shows up on the database, and all essential information needed for that person is there. The DNA database also has DNA from individuals that are not criminals.

Harington’s and Randle’s use of the word database is based on using a specific application or software with a database behind it to retrieve information like the individuals’ names in the database. The application makes it easier for the user to search for the items instead of retrieving them with code like SQL.

Working Definition

Based on the definition and the contextual use of the word ‘database,’ a database is organized data stored on a computer. It can be modified and retrieved with the help of a database management system. The data and the DBMS, and the application associated with it are called a database system. Only people who are authorized can have access to the data. Many applications and websites have a database behind them to retrieve and update information.

References

Harrington, J. L. (2009). Relational database design and implementation: Clearly explained. ProQuest Ebook Central https://ebookcentral.proquest.com

Merriam-Webster. (n.d.). Database. In Merriam-Webster.com dictionary. Retrieved February 23, 2021, from https://www.merriam-webster.com/dictionary/database?src=search-dict-hed#other-words

Oxford University Press. (n.d.). Database. In Oxford Dictionary. Retrieved February 23, 2021, from

https://www-oed-com.citytech.ezproxy.cuny.edu/view/Entry/47411?redirectedFrom=database#eid

Randle, A. (2019, August 16). Why the N.y.p.d.’s DNA database has some people worried. Retrieved March 26, 2021, from https://www.nytimes.com/2019/08/16/nyregion/newyorktoday/nypd-dna-database.html?searchResultPosition=12

Shoron Reza’s Expanded Definition of Virtual Private Network (VPN)

TO: Prof. Ellis 
FROM: Shoron Reza 
DATE: 3/26/21 
SUBJECT: Expanded Definition of Virtual Private Network (VPN)

Introduction

The scientific term I selected for this expanded definition project is VPN, which is an acronym for Virtual Private Network. Below is a summary of my findings and the knowledge I have gained from researching this term. I will be discussing the various definitions and components I have discovered online through journal articles, encyclopedias and other relevant sources.

Definitions

According to Britannica, the official definition of a Virtual Private Network is “a private computer network deployed over a public telecommunications network, such as the Internet. A VPN typically includes one or more connected corporate intranets, or local area networks (LANs), which users at remote locations can access using a password authentication system” (Britannica, 2016). In simpler terms, VPN’s are systems that permit public internet networks to be utilized as private networks with the purpose of increasing security. It provides more privacy and a secure connection within a public network. When you are in a public place such as a cafĂ© or a library, you most likely would want to use their public Wi-Fi network to access the internet. However, this is not safe due to the fact that the information from your device will then be accessible by everyone else using the same Wi-Fi network. That is where VPN comes into play with providing an extra layer of security. You will still be able to access the internet with the public Wi-Fi, but will be safeguarded by the Virtual Private Network. Based on the Network Encyclopedia, “VPNs use tunneling technologies to allow users to access private network resources through the Internet or another public network. Users enjoy the same security and features formerly available only in their private networks” (Editor, 2020). This emphasizes that with a VPN, there is much more security and is the safer option when it comes to surfing the web through a public connection.

Context

Back in 1996, employees working for Microsoft Corporation created a procedure called PPTP, which stands for point-to-point tunneling protocol. It was a system of designing a protected network between users through encoding data and establishing a tunnel over local area network (LAN) or wide area network (WAN) connections. This procedure allows the transfer of confidential and significant data securely, even within public networks. The only thing needed to send and receive secured information through PPTP is a username, password and an IP address. Due to these simple requirements, PPTP has continued to be one of the most popular types of VPN. Originally, VPN’s were utilized by big corporations but throughout the years, internet users have become more alert to the probability of threats with working online and have started discovering more secure ways of using the internet. Nowadays, VPN’s are being used by many people to safely access the internet, avoid being hacked, prevent viruses from entering their technological devices and finally, ensuring online privacy.

According to Mujović, the purpose of a VPN is “to create a private connection between multiple people and devices across the Internet. In effect it is an Internet within an Internet, secure private and encrypted from prying eyes, malware, hackers and anyone else who may wish to know where you surf, or where you are surfing from” (Mujović, 2018). This actively demonstrates the importance of using a VPN when you are accessing a public network. It can protect your personal data and sensitive information from being stolen by cybercriminals. The term VPN is also discussed in context to multiprotocol label switching in a journal article. The writer states “a network in which customer connectivity amongst multiple sites is deployed on a shared infrastructure, that utilizes the same security, management, and quality of service policies that are applied in a private network” (Azher et al, 2005). The article provides an overview of the multiprotocol label switching VPN technology services and how it relates to other types of VPN. It highlights the problems linked to delivering VPN services in a MPLS setting.

Working Definition

The scientific term Virtual Private Network directly correlates to my major in Networking & Security because of how and why it was initially created. To sum up everything that has been stated so far, VPNs were formed to protect users from getting their data stolen by unauthorized individuals also known as “hackers” or “cybercriminals.” With a VPN, all your data is directed through an encrypted cybernetic tunnel. By this, your IP address is unknown when using public networks, making its location hidden to everyone. Cybersecurity continues to be a developing field due to the advancement and use of technology within our generation. With the help of VPNs, your data can now be safe and protected.

References

Britannica, T. Editors of Encyclopaedia (2016, June 3). Virtual private network. Encyclopedia Britannica. https://www.britannica.com/technology/virtual-private-network

Editor. (2020, March 7). Virtual Private Network (VPN). Network Encyclopedia. https://networkencyclopedia.com/virtual-private-network-vpn/

I. Azher, M. Aurengzeb and K. Masood, “Virtual Private Network Implementation Over Multiprotocol Label Switching,” 2005 Student Conference on Engineering Sciences and Technology, Karachi, Pakistan, 2005, pp. 1-5, doi: 10.1109/SCONEST.2005.4382902.

Mujović, V. (2018, August 17). The History of VPN Creation: Purpose of VPN.
https://www.le-vpn.com/history-of-vpn/.

Foysal’s Expanded Definition of Cyber Security

To: Prof. Ellis

From: Foysal Ahmed

Date: 03/26/2021

Subject: Expanded Definition of Cyber Security 

Introduction

The purpose of this document it to inform about different type of cyber security. In this paper I will be talking about cyber security and the different type that protects out network. Network security, application security, information security, operation security, disaster recovery and business continuity and end-user education are few terms that. There is a lot of cyber threat that continues to grow everyday of the year. People get affect by cybercrime everyday anyone with a cell phone, bank account, files on the computer. Cyber security is set in this place to protect us from hackers and even terrorist from hacking any sensitive files. People have private information that they do not want to be out in the world or probably do not even want their family members or even friends to see. Cybercrime which is one or a couple of people causing disruption or targeting people for financial purposes (Kaspersky, 2021). Cyber-attacks get information pertaining to public affairs another type of threat is cyberterrorism “is intended to undermine electronic systems to cause panic or fear” (Kaspersky, 2021).

Definition:

Cyber security is very important part in the world. The purpose of cyber security “is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks” (Kaspersky, 2021). There are a few types of security that works in different ways Network security, application security, information security, operational security, Disaster recovery and business continuity, and end-user education. Network security is “the practice of securing a computer network from intruders, whether targeted attackers or opportunistic malware” (Kaspersky, 2021). Firewalls is one type of network security which is a barrier that protects your network from any unauthorized and untrusted when on the internet. Another one is access control which keep hackers or anytime of unwanted visitors gaining access to your network. Application security “focuses on keeping software and devices free of threats. A compromised application could provide access to the data its designed to protect. Successful security begins in the design stage, well before a program or device is deployed.” (Kaspersky, 2021). Kaspersky is saying that this security is in place to prevent codes or data from being taken. 

Context:

 Juliana De Groot wrote in her blog that cyber security means “the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access.” ( De Groot , 2020). She speaks on how important cyber security is important everywhere. From the government to the military and even the stores that store information from customers on there computer database. Just like Kaspersky, Groot also spoke on the elements of cyber security. Her definition network security is “The process of protecting the network from unwanted users, attacks and intrusions” ( De Groot , 2020). Which is basically saying the same thing as Kaspersky. She continues to speak on application security, Disaster recovery and business continuity. She added cloud security and mobile security. Cloud security is “Many files are in digital environments or “the cloud”. Protecting data in a 100% online environment presents a large amount of challenges.” And mobile security is “Cell phones and tablets involve virtually every type of security challenge in and of themselves. ( De Groot , 2020).

Working:

The field that I am going into is cyber security. As a Cyber Security Specialist, I will be providing security to many software, data centers as well as networks. By this I will be helping businesses protect their computers from any hackers that try to get into their network. Cyber Security Specialist is also look out for threat; they conduct the necessary procedure to determine they threat. They also test and identify the network and system vulnerabilities. I will also be responsible for looking after the security that was built into the system software, hardware and other components. Another one is building firewalls into the network infrastructures, I will also work along side police when it is needed to discuss who hacked into the network and so on. In today we have a lot of cyber threat that is going on, from hackers to trojans, data breaches. It would be my job to protect all the things that would happen to people network system and keep their information safe. 

Reference:

Kaspersky. (2021, January 13). What is cyber security? Retrieved March 09, 2021, from https://usa.kaspersky.com/resource-center/definitions/what-is-cyber-security

De Groot, J. (2020, October 05). What is Cyber Security? Definition, Best Practices & More [Web log post]. Retrieved March 09, 2021, from https://digitalguardian.com/blog/what-cyber-security

Mahir’s Expanded Definition of Cloud Computing

TO: Prof. Jason Ellis

FROM: Mahir Faisal

DATE: March 26th ,2021

SUBJECT: Expanded Definition of Cloud Computing

Introduction

The Purpose of 750-1000 Word Expanded Definition project is to show the readers about the use cases of a specific term in different contexts and quotes. The term I have selected for my 750-1000 word expanded definition project is “Cloud Computing”. I am going to discuss the term in my own words by comparing the term with the definitions and contextual sentences I have included on this document. In the following document, I discussed several definitions of the term, I compared several contextual uses of the term and finally I wrote my own working definition of the term.

Definitions

“An approach to computing in which the end user connects to a remote network of computers (the cloud) to run programs, store data, etc. This enables users to access large amounts of data storage and computing power from anywhere in the world without having to own and maintain these resources themselves.” (Oxford University Press,2016)

On my First definition it explains cloud computing infrastructure help users remotely to elastically run programs, databases and provide storage options to secure the data. In addition, users have access to the system anytime without the necessity of maintaining a whole data centers and servers. On the second definition, the concept of cloud computing is similar. For example- Cloud Services has five characteristics which defines the availability and compatibility of the resources and gives the privilege to interact with the services.

“According to National Institute of Science and Technology the definition of cloud computing outlines five key cloud characteristics: on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service.” (Derrick et al.,2014)


On this definition the author gives solid definition on cloud computing by providing its five pillars. It means cloud infrastructure provides on demand services, remotely access the network, effective resources, rapidly increase the demand of the instances (Virtual Computers), and measured services. All these services and resources help the users to effectively conduct their applications and programs without the provisioning of the servers or storage. Cloud providers do everything for them if they choose Software as Service model (SaaS). Compare to the First Definition this definition gives the broader picture of cloud infrastructure and its services.

Context

Cloud computing is the main component of the modern widespread paradigm, where resources are shared and globally accessed over the network. This has rendered the Internet a large repository where most of the available resources can be accessed “as a service.”

I have found this contextual sentence on a book called “Security for cloud computing” where this Quote explains cloud resources can be accessed and shared globally as a service. Most users share the data over the network to make it redundant. However, these resources have some limitations to prevent any kind of network attacks. Many companies are migrating to the cloud for better cost optimization and performance efficiency. The similarity between the contextual quotes is cloud computing are providing resources with cost savings, resilient performance, and constant availability of the data.

In cloud computing, a resource provisioning mechanism is required to supply cloud consumers a set of computing resources for processing the jobs and storing the data. Cloud providers can offer cloud consumers two resource provisioning plans, namely short-term on-demand, and long-term reservation plans. (Chai Siri et al.,2012, p. 164)

  I have found this contextual sentence on an article called “Optimization of Resource Provisioning Cost in Cloud Computing”. This quote explains a functional computing requires resource Provisioning which means the selection, deployment, and run-time management of software. Moreover, Hardware provisioning is also required for better performance. Without the provision a service would not function properly, and users cannot compute. To make this work, many users choose short term on demand instances (Virtual computers) to run the programs or batch jobs for schedule system updates, and for long term usage, users choose reserved instances for cheaper cost and effective performance and they can use the instance for 1-3 years.

Working Definition

Based on my analysis and research I can say that cloud computing has made huge impact on organizations. The resources and services help the users to maintain the data and run programs without having the necessity of maintaining the servers and data centers. Thus, Users can choose provisioning plans for better cost optimization and redundant performance.

References

Rountree, Derrick, and Ileana Castrillo. The Basics of Cloud Computing: Understanding the Fundamentals of Cloud Computing in Theory and Practice, Elsevier Science & Technology Books, 2013. ProQuest eBook Central, http://ebookcentral.proquest.com/lib/citytech-ebooks/detail.action?docID=1115176.
Created from citytech-ebooks on 2021-03-06 16:45:51.

Lombardi, Flavio, and Pietro, Roberto Di. Security for Cloud Computing, Artech House, 2015. ProQuestEbook Central, http://ebookcentral.proquest.com/lib/citytech-ebooks/detail.action?docID=4186582.
Created from citytech-ebooks on 2021-03-06 17:53:08.

S. Chaisiri, B. Lee and D. Niyato, “Optimization of Resource Provisioning Cost in Cloud Computing,” in IEEE Transactions on Services Computing, vol. 5, no. 2, pp. 164-177, April-June 2012, doi: 10.1109/TSC.2011.7.

Jerry Chen’s Expanded Definition of Authentication

TO: Prof. Ellis
FROM: Jerry Chen
DATE: 3/26/2021
SUBJECT: Expanded Definition of Authentication

Introduction

As we all know, we are human and unique, and all of us have our own way to understand and learn, as well as the way we definite something new to us. Somehow, the different ways of how we definite something new usually end up having various types of meaning. The purpose of this document is to explore the definition of the term that I chose and make it easier for others to understand regardless of the ways that we learn differently. The term that I am defining for a better understanding is “authentication”. As to further explore the definition of the term “authentication”, I am going to discuss the general definitions from my research sources follow by the context that the item being used in. I am also provided the working definition of the term and how it related to the network security field.

Definitions

According to the author (Ince, 2014), “The process of convincing a network that a person is who he or she claims to be. This follows the process of identification. Devices that are used for authentication include passwords, personal identification numbers, smart cards, and biometric identification systems.” This definition generally shows that authentication is a process to identify the identity before allowing admission to access to something, which the secret word or code needs to be correctly matched with the one that set up by the owner previously, otherwise will get declined by the authentication process.

To have a better understanding of the term “authentication”, the following definition also provided a better sense of what authentication is. According to the authors (Butterfield et al., 2016), “A process by which subjects, normal users, establish their identity to a system. This may be effected by the use of a password or possession of a physical device, e.g. a coded token. In reverse authentication, the object is required to authenticate to the subject, e.g. to establish user confidence regarding the object, before sensitive information is entered into a system.” This definition illustrates that authentication is the process by which the users have to provide the exact credentials they set up previously before they can gain access to their information. The purpose of setting up the credentials is to protect unauthorized access to their information in which needs authentication method get involve to makes it fully effective.

In the book “What is authentication?” by Rosencrance (2018). “Authentication is the process of determining whether someone or something is, in fact, who or what it declares itself to be. Authentication technology provides access control for systems by checking to see if a user’s credentials match the credentials in a database of authorized users or in a data authentication server.” This definition also defines as authentication is the process to identify the identity by asking the users to enter the secure secret word or codes that they set up beforehand. All of these definitions are way similar as they are all defined as authentication is the process to identify the identity by obtaining the right credentials and acknowledged the request if the credentials are matched with the information stored in the cloud or database.

Context

Authentication is widely used in the network security field as it can control who can have access to the credential information within the company in which sort by the role assigned by the one who has that authority. According to the article “Implementation of an Advanced authentication method within Microsoft Active DIRECTORY network services” (Kadlec et al., 2010), “Authentication is the process by which end users identify themselves to a network and customized access capabilities are given based on the role they serve in the organization.” This quote describes the term authentication as best used in the network field. Every organization has its own policy and ranking. Every ranking has its own authority to access certain levels of credential information of the company, where authentication is used in place to identify the accessibility of the employees.

There is another source of reference found to aid in providing more details of the term used in the field. According to Grimes (2019), “The primary reason for authentication is to confirm a subject’s ability to access protected resources (e.g., security domains, files, folders, sites, services). The process determines whether the subject is who they say they are and whether they can prove it.” This quote provided more details to support the previous quote, which proved that the use of authentication in the field is to identify the accessibility of each person who claims to have access to something.

Working Definition

As I am majoring in Computer System and track in networking security, the term authentication is like nothing new to me. I am familiar with this term because it plays a huge role in the networking field. Based on the discussion of the definitions and context of the term used listed above, we can conclude that the main definition of the term authentication is the process to validate the identity. Network administrators always use the authentication method to ensure the safety of the software or systems by validating the users who try to login in by the credentials they enter. Authentication can also definite as simply as the way we unlock our phones, we must enter the right passwords before it allows us to have access to our phones.

References

Ince, D. (2019). A Dictionary of the Internet (4th ed.). Oxford University Press.

Butterfield, A., Ngondi, G. E., & Kerr, A. (2016). A Dictionary of Computer Science (7 ed.). Oxford University Press. https://doi.org/10.1093/acref/9780199688975.001.0001

Rosencrance, L. (2018, May 29). What is authentication? Retrieved March 05, 2021, from https://searchsecurity.techtarget.com/definition/authentication

Kadlec, J., Jaros, D., & Kuchta, R. (2010). Implementation of an Advanced authentication method within Microsoft Active DIRECTORY network services. 2010 6th International Conference on Wireless and Mobile Communications. http://doi:10.1109/icwmc.2010.48

Grimes, R. A. (2020). Hacking Multifactor Authentication. John Wiley & Sons, Incorporated.

Mateo Avila’s Expanded Definition of Virtual Private Network (VPN)

TO: Prof. Jason Ellis

FROM: Mateo Avila

DATE: 3/17/2021

SUBJECT: Expanded Definition of Virtual Private Network (VPN)

Introduction:

The purpose of this document is to provide an Expanded Definition that shows general understanding and use of the following term. The term that I am defining is Virtual Private Network (VPN). This provides an introduction for College Undergraduates that are studying Computer Networking and Security. I am discussing the way it is defined and the way it is used in context by providing several quoted definitions and several quoted sentences that use Virtual Private Network (VPN) in the context. Definitions, context, and finally my working definition will be provided in the order that it was mentioned.

Definitions:

The definition of Virtual Private Network (VPN) according to Encyclopedia of Small Business “Virtual private network (VPNS) are systems that use public networks to carry private information and maintain privacy through the use of a tunneling protocol and security procedures.” (Encyclopedia of Small Business, 2018) Meaning that public connectivity between people, companies, organizations, etc. are kept secure through tunneling protocol which is basically encapsulation of packets. Providing extra layers of security which will be harder to break. This keeps our location as safe.

“A system that uses code to securely access a computer in a different location via the internet. When working from home, you can securely access the office network using the company’s virtual private network” (Oxford, 2021) This definition also provides an example, which is very helpful. According to Oxford, companies use Virtual Private Network to secure their employees with access to the companies working space. This provides security to the Company as well as the employees. This definition is most likely used by people with very little knowledge about technology because it even shows an example to further understand the term.

“A VPN establishes a protected communications link across a public network between the remote computer and the computers physical linked in the local network” (Hoyle, 2018) This definition basically explains the same concept as the Encyclopedia of Small Business. They both mention public network and one uses carrying private information and the other one uses communications links when referring to securely establishing connectivity.

Context:

“In fact, F-Secure says that Freedome’s App Security contains the same scanning engine as its Safe Antivirus, meaning with Freedome installed you don’t need an extra antivirus app.” (Paul, 2019) This quote shows how different apps for Virtual Private Network not only secure your location but also it incorporates tools such as antivirus. This shows how apps for Virtual Private Network have evolve thought out the years. This term is used as a security means for personal information and detection of virus. This scenario of Virtual Private Network is intended to target individuals as an audience. It talks about different types of VPNs and tries to advice you on which you should use depending upon your needs.

“A VPN allows an enterprise to interconnect geographically dispersed sites throughout a public network infrastructure. It is likely to be used by customers instead of networks constructed using private lines.” (Lamti, 2000). Meaning that Virtual Private Networks are beneficial to enterprises because it allows secure communication all over the world within their private lines. In this way, customers can securely gain access to what they are looking for and to trust their information such as back accounts.

“The encrypted messages are sent between a few well-defined points, such as a company headquarters and its branch offices, making part of their journey over the Internet.” (Babcock, 1998) This quoted shows how companies were using Virtual Private Network to encrypt messages in order to flow around the Internet to reach to its final destination securely. This quote by Babcock and the quote by Lamti, provides us examples of how enterprises, companies, business, utilize network communication by implementing security procedures and tools to provide a successful and most importantly secure environment for its customers and its data.

“If you do not have a secure connection especially on a public wireless network that anyone could use online intruders could potentially spy on the websites you visit and even steal passwords and other credentials you enter. Using a VPN while connected to any unprotected public access network is generally advised for information safety” (Biersdorfer, 2017) This quote publish in The New York Times related to first quote publish in an online article by Paul. It relates in a sense that both authors talk about personal security for us, instead of talking about company or business like the others two quotes did. Biersdorfer argues that Virtual Private Network is a key in information security when using public wireless network connections.

Working Definition:

Based on the definitions and quoted sentences about Virtual Private Network (VPN), my working definition about this term is the following. Virtual Private Network (VPN) sets public network communications with encryptions and other security steps in order to secure your data and personal information protection throughout the communication time. Virtual Private Network is so relevant because of the different apps and encryptions which are used to ensure our privacy. This technology keeps on innovating and finding new ways to provide security and integrity for network communication.

References:

Babcock, C. (1998). The art of building VPN firewalls. Inter@ctive Week, 5(29), 18. http://web.b.ebscohost.com.citytech.ezproxy.cuny.edu/ehost/detail/detail?vid=10&sid=a4d7e10e-19f9-441a-9b7a-8ebeea80195e%40pdc-v-sessmgr05&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#db=a9h&AN=976979

Biersdorfer, J.D. (2017). Tunneling though the internet on vacation. The New York Times. https://www.nytimes.com/2017/08/22/technology/personaltech/tunneling-though-the-internet-on-vacation.html?searchResultPosition=2

Hoyle, B. (2018, June 8th). Computer Hardware Security. Encyclopedia of Espionage, Intelligence, and Security. https://www.encyclopedia.com/social-sciences-and-law/law/crime-and-law-enforcement/computer-hardware-security

Lamti, L., & Yacoub, B. (2000). On managing traffic over virtual private network links. Journal of Communications and Networks, 2(2), 138-146. https://ieeexplore-ieee-org.citytech.ezproxy.cuny.edu/stamp/stamp.jsp?tp=&arnumber=6596734

Leaner’s Dictionaries, O. (2021). Virtual private network. Oxford.com. virtual-private-network noun – Definition, pictures, pronunciation and usage notes | Oxford Advanced Learner’s Dictionary at OxfordLearnersDictionaries.com

Paul, I. (2019). 5 Best Vpns for Android. PCWorld, 37(4), 81-86. http://web.a.ebscohost.com.citytech.ezproxy.cuny.edu/ehost/detail/detail?vid=8&sid=5161d3b1-9062-40dc-a8cd-4b9fa00c5047%40sessionmgr4008&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#AN=135617888&db=a9h

Small business, E. (2018, June 8th). Virtual private networks. Encyclopedia.com. https://www.encyclopedia.com/science-and-technology/computers-and-electrical-engineering/computers-and-computing/virtual-private

Pranta Dutta’s Expanded Definition of Cloud Computing.

TO: Prof. Jason Ellis

FROM: Pranta Dutta

DATE: March 23, 2021

SUBJECT: Expanded Definition of Cloud Computing

Introduction

The purpose of this 750-1000 word expanded definition is to elaborate the definition of the term “cloud computing.” The evaluation technology, where an organization may not have to maintain a costly data center to run their day-to-day activities. They can utilize cloud computing to bring the cost down and use the right amount of resources they needed. In this document, I will discuss the definition of cloud computing and how it came to be known as cloud computing. Then I will discuss its context and the working definitions.

Definitions

The Oxford English Dictionary 1996’s definition defines cloud computing as “The use of networked facilities for the storage and processing of data rather than a user’s local computer, access to data or services typically being via the internet.” According to the Oxford English Dictionary 1996’s definition, cloud computing is something that can be used to access and process data via the internet. Usually, people or any organization save and store their personal or company data in their network facilities. To obtain data from that facilities, users require permissions & they must be under the same network, which can be very costly and time-consuming. In this case, cloud computing can be beneficial. An organization or person does not need to build a data center to store all their data. They can utilize cloud storage, where they can buy as much as spaces they need, & all the data can be accessed via the internet.           

Another definition of cloud computing from Oxford’s 2001 English Dictionary defines cloud computing as “attributive, with the sense ‘relating to or involving cloud computing,’ as cloud provider, cloud service, cloud storage, etc. Cloud computing has many attributes, such as cloud service provider, cloud storage, etc. There are many companies; like Microsoft Azure, Amazon AWS that occupy large datacenter in numerous places & other people and organizations can utilize those datacenters with a fee. They do not have to think about maintaining it. On the other hand, providers like Amazon, Microsoft, Google generating money by renting their cloud space to others.

Context

“The appeal of cloud computing to a variety of buyers contributes to strong growth. The services provided are flexible and can be tailored to suit start-ups, small to medium-sized businesses, and huge enterprises, meaning that cloud computing has a wide appeal.” (Market Line Industry, 2019). In this context, cloud computing has been used as an opportunity. Buyers of the cloud space contribute to the growth also; they can cut their costs while having access to flexible cloud space. They can increase and reduce the amount of space they need. Many start-ups do not have access to a large amount of capital, to begin with. In that case, they can use cloud computing to operate their day-to-day business.

“A single cloud computing data center includes a data center building, power supply, and cooling as supporting equipment, as well as servers and networking ICT equipment.” (MASTELIC & et al. 47(2)). According to the article Cloud Computing: Survey on Energy Efficiency, to build a data center, the organization needs data center building, power supply, cooling equipment, and servers. If every organization tries to implement one for themselves, then, it would be very inefficient when it comes to energy. As previously mentioned, a datacenter provides a lot more than what an organization requires. Their share in power consumption generates between 1.1% and 1.5% of the total electricity use worldwide and is projected to rise even more. Such alarming numbers demand rethinking the energy efficiency of such infrastructures. Therefore, sharing cloud space is a way to go in terms of affordability and efficiency.

Moving to cloud computing helped three mutual funds beat the S&P 500 in the second quarter. Mutual funds invest in many different companies. DocuSign is one of them. “DocuSign benefited from the migration to cloud-based computing before the coronavirus arrived, Mr. Kass said. Then it enjoyed a boost in the first quarter as many people were forced to work from home.” (Tim, 2020). DocuSign is a cloud-based company that specializes in electronic signatures. Their business took off due to pandemics since many people started working from home. Also, they migrated to cloud-based computing before the pandemic, which gives them another boost in profitably. Most of their employees are working from home, which reduces the cost of office space, electricity, and many more. This shows the effectiveness of cloud computing. It not only helps you save money also increases profitability.

Working Definition

Based on my research, I would define cloud computing as storing and accessing data and programs over the internet instead of your computer’s hard drive. As we move forward, cloud computing will become more and more popular as it promotes minimalism. For example, you might have Microsoft office, excel, notes, etc. installed on your computer. But if you use cloud computing, then you can simply log in to one drive & use all these services without installing them on your computer.

Reference

Cloud computing. (1996). In Oxford English Dictionary. https://www-oed-com.citytech.ezproxy.cuny.edu/view/Entry/34689?redirectedFrom=cloud+computing+#eid189443962

Cloud Computing. (2001). In Oxford English Dictionary. https://www-oed-com.citytech.ezproxy.cuny.edu/view/Entry/34689?redirectedFrom=cloud+computing+#eid189443962

MarketLine Industry Profile: Cloud Computing in Global. (2019). Cloud Computing Industry Profile: Global, N.PAG. http://web.b.ebscohost.com.citytech.ezproxy.cuny.edu/ehost/pdfviewer/pdfviewer?vid=5&sid=7d308bce-b05b-4ea1-9533-ac816c00dd4e%40pdc-v-sessmgr04

MASTELIC, T., OLEKSIAK, A., CLAUSSEN, H., BRANDIC, I., PIERSON, J.-M., & VASILAKOS, A. V. (2015). Cloud Computing: Survey on Energy Efficiency. ACM Computing Surveys, 47(2), 33:1-33:36. https://doi.org/10.1145/2656204

Gray, Tim. “Investors Posted Returns So Great They Seemed Wrong.” New York Times, 10 July 2020, www.nytimes.com/2020/07/10/business/investors-returns-great-funds.html?searchResultPosition=4.