Sunday 26 January 2020

Computing ethics + homework



Computing ethics



I have to do some research on computing ethics and set out what impact it has on my major project. For my task, I have chosen one of ten moral principles namely:

''6) Thou shalt not use or copy proprietary software for which you have not paid: Software is an intellectual product. In that way, it is like a book: Obtaining illegal copies of copyrighted software is as bad as photocopying a copyrighted book. There are laws against both. Information about the copyright owner can be embedded by a process called watermarking into pictures in the digital format'' (Techterms.com, 2017 cited in DMUIC course,2020).


''Intellectual property theft involves robbing people or companies of their ideas, inventions, and creative expressions—known as “intellectual property”—which can include everything from trade secrets and proprietary products and parts to movies, music, and software.'' (FBI, 2020) 

Once time with internet expansion, violation of intellectual property is constantly expanding. According to ICE* (2019), '' more than 1 million copyright-infringing domain names of commercial websites engaged in the illegal sale and distribution of counterfeit goods and copyrighted works are now in the custody of the federal government, thanks to the combined efforts of law enforcement agencies across the world. Federal agencies, as part of the National Intellectual Property Rights Center (IPR Center), seized the websites during the year leading up to Cyber Monday, Dec. 2, 2019 ''.

This ethic will have an impact on my research due to intellectual property. All I will write must be referenced because not all my ideas are own ideas,, most off them are inspired by other researchers.

Teacher comment:

"The commandment you have picked comes from the Computer Ethics Institute (this is referenced on the paperwork in the course handout). There are no references here but you have added in-text citations, so you obviously have got the information from an external source. Remember to add these".

Dear Carrie, thank you for your comment, I will add as a secondary source.

Wednesday 22 January 2020

Essay

Combating cyberattacks

In this essay, I will show my research about how we can fight with cyberattacks and keep our technologies secure and viable. My view is focused on a small part of cyberattacks, more precisely on the attacks against the computer, most of those will be found on my major project, whose name is Security tools to combating cyberattacks. I will describe some types of cyberattacks in the first paragraph and the defenses against cyberattacks in the second paragraph. What grabs my attention is regarding the diversity of cyberattacks and how its strongest is increasing year by year becoming harmful.

In the last decade technologies era confront thousands of cyberattacks. According to the Hiscox Readiness Report in 2019, companies have reported cyber incidents have risen from 45% in 2018 to 61% in 2019(Wharton 2019). The Cyber Security Breaches Survey has shown around 32% of business and 22% of charities in The UK confronted with attacks or breaches, the most common attacks are phishing attacks, viruses, spyware, malware including ransomware attacks (Vaidya, 2019).
 "Malware is short for malicious software and is typically used as a catch-all term to refer to any software designed to cause damage to a single computer, server, or computer network, whether it is a virus, spyware, et al.'' (Moir R, 2009). Therefore, infection of malicious software can cause catastrophic damage. For example, a Trojan or a virus may delete important data, overload the network by DDoS(Distributed Denial of Service) attack, hardware failure and otherwise failure in the system functionality.  A large number of Trojan or viruses do not show their presence in the computer and the system can be operable, and they can produce damage without being detected(Kaspersky, 2020).

On the other hands these attacks led to the creation of software to protect against malicious software. According to Kaspersky (2020), we can use three methods, judicial, educational or technical. The judicial method consists of issuing laws that prohibit the distribution of programs that process cybersecurity. Over the years many people throughout the world were arrested for cybercrime, many cases remained unnoticed due to insignificant damage. The second method refers to protect via education if users are informing about how easy they could deviate from cyber law. Most often these two methods offer reduced safety it is recommended the protection offered by programs built for this purpose. For the reason that IT security experts developed antivirus software. The majority of actual software is created to protect against all types of computerized threats, containing worms, viruses, Trojans, and adware. In addition, exposure to contamination could be avoided through following some tips for example, not access folders or links from unknown sources, and restricting access to possibly dangerous websites (Kaspersky,2020).

In conclusion, combating cyberattacks is not easy and will never end. In the future, with the development of technology the attacks becoming more stronger and harder to annihilate. Henceforth I will aim attention at different computer security tools also, I want to find if Artificial intelligence will suffer damage due to cyber attacks. I have identified a few companies that offer reliable antivirus software, for example, McAfee, Kaspersky and Norton which I will study in profoundness.


Reference list:
Kaspersky AO (2020) Malware protection methods and techniques. [Online]. Available from:https: //encyclopedia.kaspersky.com/knowledge/malware-protection-methods-and-techniques/ [Accessed 26/01/2020].

Moir R ( 2009) Defining Malware FAQ.[Online]. Available from: https://docs.microsoft.com/en-us/previous-versions/tn-archive/dd632948(v=technet.10)?redirectedfrom=MSDN [Accessed 26/01/2020] 

Vaidya R (2019) Cyber Security Breaches Survey 2019. [Online]. Available from: https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/813599/Cyber_Security_Breaches_Survey_2019_-_Main_Report.pdf [Accessed 26/01/2020].

Wharton G (2019) Hiscox Cyber Readiness Report 2019. [Online]. Available from:https://www.hiscox.co.uk/sites/uk/files/documents/2019-04/Hiscox_Cyber_Readiness_Report_2019.PDF. [Accessed 26/01/2020].


Tuesday 21 January 2020

Plan for major project.


Planning for Major Project

Name: Alina Oana Kiss
Project Title: Types of cyber attacks and security tools against them.

Date started
Time allowed
Task/Activity
Completed
(date)
08/01/202h
I completed my Welcome post

08/01/2020
09/01/2020
1hI chose a title for my essay and i have written the essay09/01/2020
26/01/2020
1hour
After I finished research about my first and second ideas, I have chosen a title for the third idea.


26./01/2020
18.01.20
8 h

 did some research about the most common  types of cyberattacks and 
some security tools which are necessary.

22.01.2020
24/01/2020
15 hours
split in a week
Presentation week, I did my presentation 


06/02/2020
21/01/2020
I allowed 2 weeks  2.5 hours a day. 20 hours
Starts research for the major project


18.02.2020
18.02.2020
7 hours

Starts new posts and study case

week 9
20.02.2020
10 hours

working progress and class task

week 9
20.02.2020
15 hours

working progress for second parts of the major project and finish study case

week 9
20.02.2020


10 hours
Finish my posts.
week 10


Second main idea! major project

The second initial idea covers all my major projects.

For my third initial ideas, I will focus on Types of cyber-attacks and security tools to protect against them. 

For my major project, I will study about some attacks and types of software.
I will do research about what demand is offered by the market.

I will study in-depth about the most common types of cyberattacks. Furthermore, I want to do research about one of the notorious cyber attacks that hit the UK and worldwide in the last years, namely ''Wanna Cry''. On the bottom, I have drawn a spider diagram, which helps me to split my theme project in a few posts. Every subtopic will be a post.


In addition, I want to research tools against cyber attacks.




 I will describe each section into a new post.


Thursday 9 January 2020

First main idea

My first main idea      

        Because I will study Cyber Security my ideas will reflect in that way. Hence, I will look over what Cyber Security means and why it is important to have it as part of computing science. I did some research and I found many information about Cyber Security does mean: ''Cybersecurity is the protection of internet-connected systems, including hardware, software, and data, from cyberattacks. In a computing context, security comprises cybersecurity and physical security -- both are used by enterprises to protect against unauthorized access to data centers and other computerized systems.'' Rouser M, Gills A, and Clark C, Cybersecurity, 2019, 09.01.2020 <https://searchsecurity.techtarget.com/definition/cybersecurit>


         I will focus on a large area to complete task 1 (essay) due to the wide range of domains that must be protected by attacks. In these days the technology is finding everywhere. We cannot conceive our life without technology, for example, a smartphone is used both to initiate a conversation, write a message or have a video conversation as well as on search information, keep a diary, make photos and video and many other things. Consequently, bad guys are prepared to attacks this kind of technology using methods such as hacking, phishing, scamming. ....

update: Saturday 11th of January I have been at Uni for Open Day. I take place for the presentation about my future course, and I have found cyberattacks not mean just the INTERNET, it can be in any device such as smart fridges, cars or smart houses. Attacks can take place anywhere and anytime and we must be prepared.
will continue .....

update  22.01.2020
The beginning is very hard due to much information, which can be found online.  I will put myself some questions.

1. How to start cybercrime?
   
        Due to my research, I found the first virus which attacked the PC/DOS was recorded in 1986, this kind of virus attacks the PC, via the DOS system it was made by two brethren  Basit and Amjad Farook Alvi native from Pakistan. The name of the virus was called The Brain or The Pakistani Flu. this virus was harmless, no create massive destruction. Further, IBM created in 1987 the first antivirus software due to this virus. With the development of the internet, the virus becomes harmfull and hard to control. Kaspersky AO, 2020, A Brief History of Computer Viruses & What the Future Holds, Kaspersky, 22/01/2020, <https://www.kaspersky.co.uk/resource-center/threats/a-brief-history-of-computer-viruses-and-what-the-future-holds>

2. Who is behind these cyber attacks? Behind these attacks could be anybody, starts to youngest people, adults or could be an authority like a country or an organization.

3. How they take place?

I participated in a demonstration of an attack on DMU open day, Cyber Security department.
The demonstration has shown an attack over a  process by using a computer. For the process, they have used a water pump to pump the water from a container in another using software to start the process. In the middle of the process, the scientist has sent an email that contains malware under a PDF format( usually a PDF is secure) which was download by the user into his computer, however, this kind of documents can be outsmarted and mislead our thinking. After the malware was downloaded, the attack took place and stoping the pump function.



4. How we can protect against them?
The first step is to have an antivirus subscription. Avoid opening unknown emails, folders or any other file.
Keep the browser update.


5. In the future, the number of attacks will increase?








After I did some research I found a title for my essay Combating cyberattacks. I will advise with my tutors if is the right title and I will write in another post.

Wednesday 8 January 2020

Welcome to my blog!

About me and my research project.


Hello, everyone, my name is Alina Oana Kiss. I am a student at DMUIC, where I am studying IYZ Computing, after that, I will study Cyber Security at DMU. 

My previous studies are in Construction, I am a plumber. I know this kind of job is not for a woman, although, I passed my exam with good marks, both in the practical and the theoretical part I do not find in this occupation due to my passion for computing. After I finished my studies job market was hit by recession and I was put in the situation to be unemployed. The job center offers me a chance to follow a course, web design, and it piqued me an interest in computing. Therefore, after a true adventure, I succeed to be a student at DMU and fallow my dream in computing engineering.

At the moment I am in the second term and I will study Computer Skills and Research. For this project, I choose to research a topic about my course which I will study at DMU, regarding Cyber Security.

I have some hobbies like gaming, in special online card games like Poker. Due to this hobby for gaming, I tried to build a game. It is hard, however,  I strive to finish it after I will accumulate more experience in computer science. Another hobby is traveling, barely it required time and money. The second one is the most important and I need to wait until I have it.