Resource on NAS or SAN Storage Technologies
VerifiedAdded on 2023/03/31
|9
|3647
|91
AI Summary
This resource provides an overview of Network Attached Storage (NAS) and its role in centralized file storage. It discusses the features and benefits of NAS devices, such as Seagate Personal Cloud 2-Bay NAS drive, and their compatibility with different operating systems. The resource also highlights the use of Ethernet connections for LAN connectivity and cloud backup options.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
COIT 20246 ASSIGNMENT SUBMISSION
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Please fill in the following details:
Student Name
Student Number
Tutor’s Name
Instructions
It will be necessary to use online resources to complete this assignment, please
ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use
your own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is
a table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Each summary should briefly explain:
- What the resource is about
- Why you selected it
- What are the main points or key information covered in the resource?
- Why the resource was useful.
For more advice about how to complete the assignment, as well as examples and
information about selecting good resources, please see the assessment page on the
Moodle unit web site:
https://moodle.cqu.edu.au/mod/assign/view.php?id=886270
1
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Please fill in the following details:
Student Name
Student Number
Tutor’s Name
Instructions
It will be necessary to use online resources to complete this assignment, please
ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use
your own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is
a table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Each summary should briefly explain:
- What the resource is about
- Why you selected it
- What are the main points or key information covered in the resource?
- Why the resource was useful.
For more advice about how to complete the assignment, as well as examples and
information about selecting good resources, please see the assessment page on the
Moodle unit web site:
https://moodle.cqu.edu.au/mod/assign/view.php?id=886270
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Week 1
The text discusses examples of traditional mass storage such as magnetic disk and
solid-state drives. While these still underpin most mass storage, in corporate
environments they are often accessed via Network Attached Storage (NAS) or
Storage Area Network (SAN) technologies. Find and summarise ONE resource that
describes EITHER NAS or SAN storage technologies. The resource, and your
summary, must focus on either NAS or SAN, NOT BOTH.
Title and Reference: Seagate Personal Cloud 2-Bay NAS drive
https://www.seagate.com/in/en/manuals/network-storage/seagate-personal-cloud-2bay/welcome-
to-your-personal-cloud-2-bay/
Liu, R. and Gröger, J., Kleine Netzwerkspeicher.
Summary:
Network Attached Storage is considered a file storage which is associated with
allowing numerous users along with heterogeneous devices of the user devices
being capable of collecting the data from a disk which would be entirely centralized.
All the NAS is seen to be remaining in the LAN and acts an independent node of the
network. This in turn is characterized by the IP addresses (Internet Protocol) which
are identical. So it can be described as a device associated with storing data. The
Ethernet connection is used by the NAS based device so as to get connected to the
LAN. NAS is generally comes in three different variants which includes 4TB, 6TB and
8TB which is manufactured by the company Seagate. This is also responsible for
providing of cloud backup by usage of the Ethernet, Gb Ethernet and fast Ethernet
which are associated with acting as a data link protocol. This generally consists of
the certain interfaces such as the Ethernet 1000, USB 3.0 and USB 2.0. Besides this,
the NAS is supported by the different operating systems which include the Microsoft
windows 7, 8,8.1,10 and vista, Apple MacOS X 10.7 or later. NAS is seen to be
operating in a single device for the purpose of handling the different kind of data files.
This is also associated with compromising of some other components such as the
Seagate dashboard, responsible for the creation of backup plans along with backups
for the content of the system in an automatic manner. This is also associated with the
creation and handling of the system’s media library with the technique of Smart Copy
, mobile data back up given to the system, and the other networks that are seen to
be linked with the storage devices.
Week 2
Operating systems use file managers to interact with mass storage devices.
However, the way in which data is stored and retrieved is dictated by the file system.
There are many types of file systems used by modern operating systems. Find and
summarise ONE resource that describes ONE such file system that is NOT FAT,
FAT32 or ExFAT. The resource, and your summary, must focus on A SINGLE file
system.
Title and Reference: Total Commander 9.22a
https://www.techspot.com/downloads/301-total-commander.html
Summary:
The users who are associated with using the Windows basically prefers the file
2
The text discusses examples of traditional mass storage such as magnetic disk and
solid-state drives. While these still underpin most mass storage, in corporate
environments they are often accessed via Network Attached Storage (NAS) or
Storage Area Network (SAN) technologies. Find and summarise ONE resource that
describes EITHER NAS or SAN storage technologies. The resource, and your
summary, must focus on either NAS or SAN, NOT BOTH.
Title and Reference: Seagate Personal Cloud 2-Bay NAS drive
https://www.seagate.com/in/en/manuals/network-storage/seagate-personal-cloud-2bay/welcome-
to-your-personal-cloud-2-bay/
Liu, R. and Gröger, J., Kleine Netzwerkspeicher.
Summary:
Network Attached Storage is considered a file storage which is associated with
allowing numerous users along with heterogeneous devices of the user devices
being capable of collecting the data from a disk which would be entirely centralized.
All the NAS is seen to be remaining in the LAN and acts an independent node of the
network. This in turn is characterized by the IP addresses (Internet Protocol) which
are identical. So it can be described as a device associated with storing data. The
Ethernet connection is used by the NAS based device so as to get connected to the
LAN. NAS is generally comes in three different variants which includes 4TB, 6TB and
8TB which is manufactured by the company Seagate. This is also responsible for
providing of cloud backup by usage of the Ethernet, Gb Ethernet and fast Ethernet
which are associated with acting as a data link protocol. This generally consists of
the certain interfaces such as the Ethernet 1000, USB 3.0 and USB 2.0. Besides this,
the NAS is supported by the different operating systems which include the Microsoft
windows 7, 8,8.1,10 and vista, Apple MacOS X 10.7 or later. NAS is seen to be
operating in a single device for the purpose of handling the different kind of data files.
This is also associated with compromising of some other components such as the
Seagate dashboard, responsible for the creation of backup plans along with backups
for the content of the system in an automatic manner. This is also associated with the
creation and handling of the system’s media library with the technique of Smart Copy
, mobile data back up given to the system, and the other networks that are seen to
be linked with the storage devices.
Week 2
Operating systems use file managers to interact with mass storage devices.
However, the way in which data is stored and retrieved is dictated by the file system.
There are many types of file systems used by modern operating systems. Find and
summarise ONE resource that describes ONE such file system that is NOT FAT,
FAT32 or ExFAT. The resource, and your summary, must focus on A SINGLE file
system.
Title and Reference: Total Commander 9.22a
https://www.techspot.com/downloads/301-total-commander.html
Summary:
The users who are associated with using the Windows basically prefers the file
2
manager which is provided as a default application however because of some of the
additional benefits some users also exists who prefers the usage of the third party file
manager software. One such is called Total Commander 9.22a, high level file
manager software associated with the utilization of the classy framework existing in
the two vertical frames. This tool is associated with acting as one of the best tool
helping in sharing of the huge files on a regular basis. It is also possible for the users
to verify the progress of the transfer of the files that are being shared such as the
progress, resuming or pausing option which are also available. In addition to this
different formats of the archive are also seen to be supported by this tool such as the
GZ, TAR, ZIP, RAR and many more. The tool is also seen to be helpful in the
process of comparing the files in terms of the file synchronization, merging and
splitting the files’ contents which are big in size. The software is also associated with
providing the facility of Renaming the file by usage of multi-name. This is also
different from the other available software because of the availability of search option
and is seen to be consisting of a built-in FTP client with server to server (FXP) and
HTTP support.
Week 3
The National Broadband Network (NBN) is currently being rolled-out across Australia
and there is a mix of technologies that are being used to deliver Internet services (for
example, FTTN, FTTC, FTTP, HFC, fixed wireless and satellite). Find and
summarise ONE resource that describes ONE of these delivery technologies. The
resource, and your summary, must focus on A SINGLE technology.
Title and Reference: FTTP broadband
https://www.thinkbroadband.com/guides/fibre-fttc-ftth-broadband-guide
Summary:
FTTP (Fibre to the premises) known by the name FTTH (Fibre to the Home) is
considered to a type of system associated with delivering internet to the users and is
associated with dealing with the connection which is end-to-end fibre optic based.
This is also associated with delivering a speed which is much faster than the FTTC
(Fibre to the Cabinet) and the reason behind this is the fact that it is entirely
independent of the distance which means the distance is not associated with
hampering the speed of the internet. The speed of downloading is around 330Mbps
whereas the speed of upstream is around 30Mbps. This is generally seen to be
running over the cable of optical starting from the telephone exchange and ending at
the user’s house. In general this fibre is normally found to be connected around the
property of a user along with which a short OFC also exists which gets connected to
the modem responsible for the providing of Ethernet connection to the broadband
router. This type of connection is having more reliability and the reason behind this is
that is unaffected by any of the VDSL2 or the ADSL. There are two layout designs of
the FTTP architecture which includes the Passive Optical Network (PON) and Active
Ethernet. Some of the essential features owned by this delivery system is to have
physical robust, voice, video support and long lifetime.
Week 4
The Internet is made up of many interconnected servers and networks. Users are
increasingly aware and concerned that their Internet communications can be
intercepted and monitored. Tor is one technology that allows users to obscure or
hide online their online activities. Find and summarise ONE resource that describes
what Tor is and how it works. The resource, and your summary, must focus purely on
Tor.
3
additional benefits some users also exists who prefers the usage of the third party file
manager software. One such is called Total Commander 9.22a, high level file
manager software associated with the utilization of the classy framework existing in
the two vertical frames. This tool is associated with acting as one of the best tool
helping in sharing of the huge files on a regular basis. It is also possible for the users
to verify the progress of the transfer of the files that are being shared such as the
progress, resuming or pausing option which are also available. In addition to this
different formats of the archive are also seen to be supported by this tool such as the
GZ, TAR, ZIP, RAR and many more. The tool is also seen to be helpful in the
process of comparing the files in terms of the file synchronization, merging and
splitting the files’ contents which are big in size. The software is also associated with
providing the facility of Renaming the file by usage of multi-name. This is also
different from the other available software because of the availability of search option
and is seen to be consisting of a built-in FTP client with server to server (FXP) and
HTTP support.
Week 3
The National Broadband Network (NBN) is currently being rolled-out across Australia
and there is a mix of technologies that are being used to deliver Internet services (for
example, FTTN, FTTC, FTTP, HFC, fixed wireless and satellite). Find and
summarise ONE resource that describes ONE of these delivery technologies. The
resource, and your summary, must focus on A SINGLE technology.
Title and Reference: FTTP broadband
https://www.thinkbroadband.com/guides/fibre-fttc-ftth-broadband-guide
Summary:
FTTP (Fibre to the premises) known by the name FTTH (Fibre to the Home) is
considered to a type of system associated with delivering internet to the users and is
associated with dealing with the connection which is end-to-end fibre optic based.
This is also associated with delivering a speed which is much faster than the FTTC
(Fibre to the Cabinet) and the reason behind this is the fact that it is entirely
independent of the distance which means the distance is not associated with
hampering the speed of the internet. The speed of downloading is around 330Mbps
whereas the speed of upstream is around 30Mbps. This is generally seen to be
running over the cable of optical starting from the telephone exchange and ending at
the user’s house. In general this fibre is normally found to be connected around the
property of a user along with which a short OFC also exists which gets connected to
the modem responsible for the providing of Ethernet connection to the broadband
router. This type of connection is having more reliability and the reason behind this is
that is unaffected by any of the VDSL2 or the ADSL. There are two layout designs of
the FTTP architecture which includes the Passive Optical Network (PON) and Active
Ethernet. Some of the essential features owned by this delivery system is to have
physical robust, voice, video support and long lifetime.
Week 4
The Internet is made up of many interconnected servers and networks. Users are
increasingly aware and concerned that their Internet communications can be
intercepted and monitored. Tor is one technology that allows users to obscure or
hide online their online activities. Find and summarise ONE resource that describes
what Tor is and how it works. The resource, and your summary, must focus purely on
Tor.
3
Title and Reference: TOR
TOR network (2019). TOR network. [ebook] cs.sjsu, p.9. Available at:
http://www.cs.sjsu.edu/faculty/pollett/masters/Semesters/Fall13/akash/Tor_Network.pdf.
Summary:
TOR is considered to be an open source software used by numerous peoples for
the purpose of surfing the internet in an anonymous way. Previously this was
designed along with being deployed by the U.S. Naval Research Laboratory as the
third generation routing project that relates to onions. This also protects the
communications that are conducted by the U.S. navy. This is also supported by the
operating system, Microsoft Windows as well as by the Unixlike that includes the
Android, Linux and macOS.. Designing of the Onion routing has been done by
means of the application layer which exists in the protocol stack of communication.
TOR is also associated with a similar mechanism which includes the utilization of
various volunteer network which is directs the traffic present in the platform of
internet so as to keep the identity of the user hidden. The 1st step of this mechanism
is associated with including the identification of the free nodes which is followed by
the production of the contents which are encrypted by the client’s which is the sent in
the first identified free node. The user who is present at the other side is responsible
to decrypt the contents and also locates the next available free node. This in turn
makes this a continuous process and effectively helps the users in keeping their
identity hidden while they are surfing the internet. Followed by this when the client is
having the will of sending some of the data then they moves towards choosing a path
which is entirely different making it difficult for the interceptor to track the details of
the user.
Week 5
An emerging form of malware is cryptojacking (also known as malicious
cryptomining). Find and summarise ONE resource that describes what cryptojacking
is and how it works. The resource, and your summary, should focus purely on
cryptojacking and NO OTHER form(s) of malware.
Title and Reference: Cryptojacking
https://www.cert.be/sites/default/files/crypto_brochure_en.pdf
https://www.symantec.com/content/dam/symantec/docs/security-center/white-papers/istr-
cryptojacking-modern-cash-cow-en.pdf
Summary:
The phenomenon of using the user’s computing device in a hidden manner is
known as Cryptojacking and this done for mining of the crypto currency. This is
generally carried out by the hackers and is conducted when the user is associated
with the installation of some kind of program. Once the installation is done, it gets
hacked by the attacker and proceeds with mining of the crypto currency in a secret
manner. This seems to be working in different kind of ways such as the related script
or the erratic content which is attended directly in the website and this script can be
loaded in a hidden manner by the third party advertisements which pop ups
whenever an user is gets associate with visiting some of the websites which are
malicious in nature and this can also be present in the extensions of the browser
which has already been installed. This in turn is associated with injecting some
malicious contents of websites and the device can also get infected that in turn is
associated with the execution of the crypto mining in the background of the
operations which are being conducted by innocent users. Cryptography is considered
an illegal act that is outlawed by various existing laws for example hacking and IT
4
TOR network (2019). TOR network. [ebook] cs.sjsu, p.9. Available at:
http://www.cs.sjsu.edu/faculty/pollett/masters/Semesters/Fall13/akash/Tor_Network.pdf.
Summary:
TOR is considered to be an open source software used by numerous peoples for
the purpose of surfing the internet in an anonymous way. Previously this was
designed along with being deployed by the U.S. Naval Research Laboratory as the
third generation routing project that relates to onions. This also protects the
communications that are conducted by the U.S. navy. This is also supported by the
operating system, Microsoft Windows as well as by the Unixlike that includes the
Android, Linux and macOS.. Designing of the Onion routing has been done by
means of the application layer which exists in the protocol stack of communication.
TOR is also associated with a similar mechanism which includes the utilization of
various volunteer network which is directs the traffic present in the platform of
internet so as to keep the identity of the user hidden. The 1st step of this mechanism
is associated with including the identification of the free nodes which is followed by
the production of the contents which are encrypted by the client’s which is the sent in
the first identified free node. The user who is present at the other side is responsible
to decrypt the contents and also locates the next available free node. This in turn
makes this a continuous process and effectively helps the users in keeping their
identity hidden while they are surfing the internet. Followed by this when the client is
having the will of sending some of the data then they moves towards choosing a path
which is entirely different making it difficult for the interceptor to track the details of
the user.
Week 5
An emerging form of malware is cryptojacking (also known as malicious
cryptomining). Find and summarise ONE resource that describes what cryptojacking
is and how it works. The resource, and your summary, should focus purely on
cryptojacking and NO OTHER form(s) of malware.
Title and Reference: Cryptojacking
https://www.cert.be/sites/default/files/crypto_brochure_en.pdf
https://www.symantec.com/content/dam/symantec/docs/security-center/white-papers/istr-
cryptojacking-modern-cash-cow-en.pdf
Summary:
The phenomenon of using the user’s computing device in a hidden manner is
known as Cryptojacking and this done for mining of the crypto currency. This is
generally carried out by the hackers and is conducted when the user is associated
with the installation of some kind of program. Once the installation is done, it gets
hacked by the attacker and proceeds with mining of the crypto currency in a secret
manner. This seems to be working in different kind of ways such as the related script
or the erratic content which is attended directly in the website and this script can be
loaded in a hidden manner by the third party advertisements which pop ups
whenever an user is gets associate with visiting some of the websites which are
malicious in nature and this can also be present in the extensions of the browser
which has already been installed. This in turn is associated with injecting some
malicious contents of websites and the device can also get infected that in turn is
associated with the execution of the crypto mining in the background of the
operations which are being conducted by innocent users. Cryptography is considered
an illegal act that is outlawed by various existing laws for example hacking and IT
4
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
fraud and many more. Crypto jacking is associated with the dealing of stealing of the
resources. Crypto jacking is carried out when the system is in rest state and the
reason for this is reduction of the chances of being tracked while conducting the
crypto jacking operation.
Week 6
Redundancy is a critical aspect of network design, implemented in order to cope link
or equipment failure. One frequent cause of failure is damage to fibre optic cables
that connect countries and/or continents. Find and summarise ONE resource that
describes ONE example of such a cable being cut or damaged. The resource, and
your summary, should describe the impacts of A SINGLE EXAMPLE of a link failure.
Note that the failure must relate to a link that connects countries and/or continents.
Title and Reference: Link failure due to the damage of cable
https://www.ppc-online.com/blog/the-six-biggest-causes-of-damage-to-fiber-networks
Summary:
One of the primary key which is associated with delivering of online services from
the source ISP (Internet Service Provider) to the destination that is the user is the
Cables. Any kind of damage cable is capable of causing a huge impact upon the
connection and is also capable intercepting various operations related to human
world that are also important. This type of damages to the cable are created because
of the six different reasons which includes the vehicle damage, animals, vandalism,
acts of God and little old ladies.. One such example of damage to the cloud was
seen in case of Time Warner Cable existing in Western New York where they had to
change or repair almost around 87 miles of cable in the year of 2011 because of the
chewing of the cables by the squirrel. Cables are mostly seen to be broken by
different animals such as the squirrel, monkeys, and rats and so on. Besides this the
vehicles having long heights might sometimes be associated with tearing the cables
unknowingly which in turn would be responsible for interrupts the connection.
Besides this the Natural disaster are also capable of damaging the cables by the
means of disrupting the connection provided by the cables. Another major foes which
is associated with damaging the cable includes the little old ladies. In the year of
2011, an old lady had been associated with digging into the ground which was
followed by cutting of the cable and this initially leads to internet facility cut off to
more 3.2 million Armenians for almost around 5 hours.
Week 7
Since the 1990s, Enterprise Systems (also known as Enterprise Resource Planning
systems) have become critical to the operation modern organisations. Over this
time, ES/ERPs have evolved and continue to change in response to new demands
and emerging technologies. Find and summarise ONE resource that discusses
emerging or future trends for ES/ERPs. The resource should be recent (published
since the beginning of 2017) and it and your summary should clearly identify how
ES/ERPs are, or are about to, change.
Title and Reference: Future trends of ERP
https://www.signitysolutions.com/blog/5-trends-2019-shape-future-erp-solutions/
https://medium.com/@gracesam989/future-trends-in-erp-systems-42b0fe582b83
Summary:
The future trends of ERP are as follows:
5
resources. Crypto jacking is carried out when the system is in rest state and the
reason for this is reduction of the chances of being tracked while conducting the
crypto jacking operation.
Week 6
Redundancy is a critical aspect of network design, implemented in order to cope link
or equipment failure. One frequent cause of failure is damage to fibre optic cables
that connect countries and/or continents. Find and summarise ONE resource that
describes ONE example of such a cable being cut or damaged. The resource, and
your summary, should describe the impacts of A SINGLE EXAMPLE of a link failure.
Note that the failure must relate to a link that connects countries and/or continents.
Title and Reference: Link failure due to the damage of cable
https://www.ppc-online.com/blog/the-six-biggest-causes-of-damage-to-fiber-networks
Summary:
One of the primary key which is associated with delivering of online services from
the source ISP (Internet Service Provider) to the destination that is the user is the
Cables. Any kind of damage cable is capable of causing a huge impact upon the
connection and is also capable intercepting various operations related to human
world that are also important. This type of damages to the cable are created because
of the six different reasons which includes the vehicle damage, animals, vandalism,
acts of God and little old ladies.. One such example of damage to the cloud was
seen in case of Time Warner Cable existing in Western New York where they had to
change or repair almost around 87 miles of cable in the year of 2011 because of the
chewing of the cables by the squirrel. Cables are mostly seen to be broken by
different animals such as the squirrel, monkeys, and rats and so on. Besides this the
vehicles having long heights might sometimes be associated with tearing the cables
unknowingly which in turn would be responsible for interrupts the connection.
Besides this the Natural disaster are also capable of damaging the cables by the
means of disrupting the connection provided by the cables. Another major foes which
is associated with damaging the cable includes the little old ladies. In the year of
2011, an old lady had been associated with digging into the ground which was
followed by cutting of the cable and this initially leads to internet facility cut off to
more 3.2 million Armenians for almost around 5 hours.
Week 7
Since the 1990s, Enterprise Systems (also known as Enterprise Resource Planning
systems) have become critical to the operation modern organisations. Over this
time, ES/ERPs have evolved and continue to change in response to new demands
and emerging technologies. Find and summarise ONE resource that discusses
emerging or future trends for ES/ERPs. The resource should be recent (published
since the beginning of 2017) and it and your summary should clearly identify how
ES/ERPs are, or are about to, change.
Title and Reference: Future trends of ERP
https://www.signitysolutions.com/blog/5-trends-2019-shape-future-erp-solutions/
https://medium.com/@gracesam989/future-trends-in-erp-systems-42b0fe582b83
Summary:
The future trends of ERP are as follows:
5
Selecting the cloud by the clients of ERP: The traditional ERP systems lack in
integration of the method of cloud computing and this is the reason why many
users are switching to usage of clouds for gaining advantages being
associated with development of business growth of the firm. The ERP based
on cloud has the capability of providing different advantages for the system
by minimizing the human resources. It is expected by the year of 2020 the
industry based on cloud would be surpassing the amount approximately US
$411. The ERP based on cloud would be allowing the Enterprises in having
solutions that are mobile.
Being ready for sudden updates- The expectations regarding the system to
get transformed to the cloud based one, developed and availability of more
regular updates which should be executed by the firms. On the basis of this
reason the business should be ready for installing new updates in order to get
the benefits of these updates.
The blockchain: the introduction of the Blockchain in the ERP system, would
be acting as one of the most trusted platform so as to conduct each and
every transactional operations. Besides this the usage of the blockchain
technology would also be associated with the activation of the supply chain
management as well as the acquisition of the customers.
Artificial Intelligence (AI): One of the major factor which would be responsible
for the deployment of the ERP system in a rapid manner is the Machine
learning. This would be done by means of providing quick services which are
entirely free from any kind of errors. This would also be associated with
helping the officials of the business in automating their business operations
which in turn would be associated with allowing the officials in concentrating
upon the core business methods so as to have business growth and to
develop the organization.
Week 8
Databases, mass data storage and interrogation technologies underpin virtually all
Information Systems and applications. However, the same tools also make it easier
for data breaches to occur in government departments or private
companies/organisations. In simple terms, a data breach is where private
information is illegally obtained or disclosed. Find and summarise ONE resource that
describes ONE example of a data breach that has occurred since the beginning of
2017. The resource, and your summary, should focus purely on A SINGLE
EXAMPLE of a data breach.
Title and Reference: Exactis data breach incident
https://blog.infoarmor.com/employees/the-exactis-breach-5-things-you-need-to-know
Summary:
Exactis is an organization which is related to marketing and aggregation situated in
the Palm Coast of Florida. The company is seen to be associated with containing
almost more than 3.5 billion client information in their database. In the year of 2018 in
the month of June Vinny Troia had been associated with discovering the data breach
by means of implementation of a search tool known as the Shodan. In addition to this
he had also been associated with finding out of the fact that almost around 7000 of
their databases had access of the public. The data breach is associated with
exposing almost 340 million data of the firm and the records breached mainly
contained of the full details of the stakeholders along with the contacts, hobbies and
personal identities and so on. This incident was informed to the officials of Exactis
and FBI by Vinny Troia after identification.
6
integration of the method of cloud computing and this is the reason why many
users are switching to usage of clouds for gaining advantages being
associated with development of business growth of the firm. The ERP based
on cloud has the capability of providing different advantages for the system
by minimizing the human resources. It is expected by the year of 2020 the
industry based on cloud would be surpassing the amount approximately US
$411. The ERP based on cloud would be allowing the Enterprises in having
solutions that are mobile.
Being ready for sudden updates- The expectations regarding the system to
get transformed to the cloud based one, developed and availability of more
regular updates which should be executed by the firms. On the basis of this
reason the business should be ready for installing new updates in order to get
the benefits of these updates.
The blockchain: the introduction of the Blockchain in the ERP system, would
be acting as one of the most trusted platform so as to conduct each and
every transactional operations. Besides this the usage of the blockchain
technology would also be associated with the activation of the supply chain
management as well as the acquisition of the customers.
Artificial Intelligence (AI): One of the major factor which would be responsible
for the deployment of the ERP system in a rapid manner is the Machine
learning. This would be done by means of providing quick services which are
entirely free from any kind of errors. This would also be associated with
helping the officials of the business in automating their business operations
which in turn would be associated with allowing the officials in concentrating
upon the core business methods so as to have business growth and to
develop the organization.
Week 8
Databases, mass data storage and interrogation technologies underpin virtually all
Information Systems and applications. However, the same tools also make it easier
for data breaches to occur in government departments or private
companies/organisations. In simple terms, a data breach is where private
information is illegally obtained or disclosed. Find and summarise ONE resource that
describes ONE example of a data breach that has occurred since the beginning of
2017. The resource, and your summary, should focus purely on A SINGLE
EXAMPLE of a data breach.
Title and Reference: Exactis data breach incident
https://blog.infoarmor.com/employees/the-exactis-breach-5-things-you-need-to-know
Summary:
Exactis is an organization which is related to marketing and aggregation situated in
the Palm Coast of Florida. The company is seen to be associated with containing
almost more than 3.5 billion client information in their database. In the year of 2018 in
the month of June Vinny Troia had been associated with discovering the data breach
by means of implementation of a search tool known as the Shodan. In addition to this
he had also been associated with finding out of the fact that almost around 7000 of
their databases had access of the public. The data breach is associated with
exposing almost 340 million data of the firm and the records breached mainly
contained of the full details of the stakeholders along with the contacts, hobbies and
personal identities and so on. This incident was informed to the officials of Exactis
and FBI by Vinny Troia after identification.
6
Week 9
Agile development is an iterative and incremental approach to delivering systems - it
is particularly useful where the requirements are unclear or evolving. Scrum is a
framework for undertaking agile development. Find and summarise ONE resource
that describes Scrum. The resource, and your summary, should focus purely on
Scrum and discuss some of its key features and attributes.
Title and Reference: Scrum
https://www.scrum.org/resources/what-is-scrum
Summary:
Scrum is considered to be the agile layout associated with the management of the
knowledge operations which are associated emphasizing upon the software
development process. This is a particular layout which can be utilized by an
individual for the purpose of representing the adaptive issues which are complex in
nature in association with the creation and production of the products of higher.
Scrum is considered to be light weight along with being difficult to master and friendly
for the user. In addition to this it is also associated with describing a product
innovation technique which would be flexible and durable and holistic due to the
collaboration of the entire team worker so as to operate together upon the same
product. Some of the primary features of the scrum include the following:
The process of documentation is Minimum
The processes included are also quite iterative
Requirements are prioritized depending upon the value of the business and
the available updates.
It is Self-managed and focuses on the satisfaction of the customer
satisfaction
Involvement of the customers is also high
Week 10
The textbook discusses activities associated with project management. However, it
could be argued that project governance is equally important, especially in very large
projects. Find and summarise ONE resource that describes what project governance
is and what activities it entails. The resource, and your summary, should focus purely
on project governance.
Title and Reference: Project governance
https://www.apm.org.uk/sites/default/files/protected/project%20governance%20slides.pdf
Summary:
Project Governance can be considered as the management layout which is
associated with including the preparation of various decisions related to the project.
The project governance is associated with playing a vital role in the project and the
reason behind this are the responsibilities and accountabilities which are laden in the
process of preparing for the business governance. For this reason the major function
of project governance is associated with providing of an effective as well as efficient
decision for a project associated with helping in the development of the business
operations as well as its productivity. Besides this it is also associated with governing
the investments of the organization upon the repeatable, robust and logical
techniques. Project governance is also seen to be comprising of the three main
pillars which mainly includes the people, information and the structure. The project
governance is seen to be consisting of four major principles which includes the
following:
Ensuring accountability related to the project success
Free Project ownership is available from the ownership of the assets and
7
Agile development is an iterative and incremental approach to delivering systems - it
is particularly useful where the requirements are unclear or evolving. Scrum is a
framework for undertaking agile development. Find and summarise ONE resource
that describes Scrum. The resource, and your summary, should focus purely on
Scrum and discuss some of its key features and attributes.
Title and Reference: Scrum
https://www.scrum.org/resources/what-is-scrum
Summary:
Scrum is considered to be the agile layout associated with the management of the
knowledge operations which are associated emphasizing upon the software
development process. This is a particular layout which can be utilized by an
individual for the purpose of representing the adaptive issues which are complex in
nature in association with the creation and production of the products of higher.
Scrum is considered to be light weight along with being difficult to master and friendly
for the user. In addition to this it is also associated with describing a product
innovation technique which would be flexible and durable and holistic due to the
collaboration of the entire team worker so as to operate together upon the same
product. Some of the primary features of the scrum include the following:
The process of documentation is Minimum
The processes included are also quite iterative
Requirements are prioritized depending upon the value of the business and
the available updates.
It is Self-managed and focuses on the satisfaction of the customer
satisfaction
Involvement of the customers is also high
Week 10
The textbook discusses activities associated with project management. However, it
could be argued that project governance is equally important, especially in very large
projects. Find and summarise ONE resource that describes what project governance
is and what activities it entails. The resource, and your summary, should focus purely
on project governance.
Title and Reference: Project governance
https://www.apm.org.uk/sites/default/files/protected/project%20governance%20slides.pdf
Summary:
Project Governance can be considered as the management layout which is
associated with including the preparation of various decisions related to the project.
The project governance is associated with playing a vital role in the project and the
reason behind this are the responsibilities and accountabilities which are laden in the
process of preparing for the business governance. For this reason the major function
of project governance is associated with providing of an effective as well as efficient
decision for a project associated with helping in the development of the business
operations as well as its productivity. Besides this it is also associated with governing
the investments of the organization upon the repeatable, robust and logical
techniques. Project governance is also seen to be comprising of the three main
pillars which mainly includes the people, information and the structure. The project
governance is seen to be consisting of four major principles which includes the
following:
Ensuring accountability related to the project success
Free Project ownership is available from the ownership of the assets and
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
services
Making sure of dividing the operations of decision making and the management
of the stakeholders.
Making sure of dividing the governance of the organization layout along with
project governance.
8
Making sure of dividing the operations of decision making and the management
of the stakeholders.
Making sure of dividing the governance of the organization layout along with
project governance.
8
MARKING SHEET - DO NOT DELETE
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the
task; summary fails to explain what the resource was about; the relevance
and/or usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent, but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot
be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content/contains content not contained in the resource) OR
Multiple resources used for a single task
Resource is generic AND/OR covers multiple technologies/examples
rather than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
9
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the
task; summary fails to explain what the resource was about; the relevance
and/or usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent, but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot
be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content/contains content not contained in the resource) OR
Multiple resources used for a single task
Resource is generic AND/OR covers multiple technologies/examples
rather than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
9
1 out of 9
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.