Desklib is an online library that provides study material, solved assignments, essays, and dissertations. Find a wide range of resources for various subjects and courses.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
COIT 20246 ASSIGNMENT SUBMISSION Due date:Thursday Week 11 (2PM AEST) Part:Written Assessment Weighting:30% of total assessment. Submission:Electronic (see course website for details) Please fill in the following details: Student Name Student Number Tutor’s Name Instructions It will be necessary to use online resources to complete this assignment, please ensure you cite and reference any such materials using the Harvard format. DO NOTcopy content directly from either the text or Internet resources: this assignment is to be in your own words.You will lose marks if you do not use your own words! Please complete your assignment usingthissubmission templatefile, inserting your responses where indicated. DO NOT delete the marking criteria page– changes are permitted to the formatting of other pages including the headers and footers. Tasks There are ten (10) tasks, one for each week: the tasks are detailed below. There is a table to complete for each task. Please fill in the information required. Note: Each resource summary should be around 200-300 words. Each summary should briefly explain: -What the resource is about -Why you selected it -What are the main points or key information covered in the resource -Why the resource was useful. For more advice about how to complete the assignment, as well as examples and information about selecting good resources, please see the assessment page on the Moodle unit web site: https://moodle.cqu.edu.au/mod/assign/view.php?id=886270 1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Week 1 The text discusses examples of traditional mass storage such as magnetic disk and solid-state drives. While these still underpin most mass storage, in corporate environments they are often accessed via Network Attached Storage (NAS) or Storage Area Network (SAN) technologies. Find and summariseONEresource that describes EITHERNAS or SAN storage technologies. The resource, and your summary, must focus on either NAS or SAN,NOT BOTH. Title and Reference: Chosen topic: Network Attached Storage (NAS) Bednarz, A. (2019).What is a SAN and how does it differ from NAS?. [online] Network World. Available at: https://www.networkworld.com/article/3256312/what-is-a-san-and- how-does-it-differ-from-nas.html [Accessed 29 May 2019]. https://www.networkworld.com/article/3256312/what-is-a-san-and-how-does-it-differ- from-nas.html Summary: This resource provides a detailed description of Storage Area Network (SAN) which helps in providing block level network access to storage. The resource also helps in understanding that there are different components of SAN such as storage elements, storage devices, switches and hosts. The resources also helps in understanding the wide range of topologies, protocols and technologies.The resources also provides in- depth discussion about the usage of the SAN and most of the associated switches. The reason behind selecting this resource is it provides a detailed explanation of the use of this service in commercial establishment. This resource also helps in understanding the wide range of protocols which are considered in SAN such as the Fibre Channel, Hyper SCSI and the Ethernet. The working principles of SAN is the key point of this SAN. The other key information which was mentioned in this resources is the association of the SAN fabric with SAN. The association with the Fibre Channel switching technology with SAN is written in this paper in a detailed manner. The resource was very much useful to understand the tape libraries and disk based services. It can be said that SAN is very much beneficial to understand how each server associated with SAN gets access to the shared devices. The role of the SAN volume controller was also stated in the paper in a professional manner. 2
Week 2 Operating systems use file managers to interact with mass storage devices. However, the way in which data is stored and retrieved is dictated by the file system. There are many types of file systems used by modern operating systems. Find and summariseONEresource that describesONEsuch file system that isNOTFAT, FAT32 or ExFAT. The resource, and your summary, must focus onA SINGLEfile system. Title and Reference: Chosen topic:New Technology File System TechRepublic. (2019).News, Tips, and Advice for Technology Professionals - TechRepublic. [online] Available at: https://www.techrepublic.com/article/file- systems-101-ntfs/ [Accessed 29 May 2019]. https://www.techrepublic.com/article/file-systems-101-ntfs/ Summary: This resource is about the New Technology File System which are increasingly used in storing and retrieving of the files on a hard disk. The use of NTFS is very much useful to keep the track of the file clusters. It can be said that the information about a file cluster can be retrieved in a useful manner using a NTFS.The main reason behind selecting this resources is it helps in identifying the advanced specifications of the NTFS. The resources also stated that more than 16 billion bytes in size can also be accessed from NTFS. The main point of discussion of this paper is it helps identifying the file compression ability of NTFS. The resources also stated that long file names are supported by NTFS. The resources was also very much useful to understand the data security provided by NTFS on both the fixed as well as the removable disks. The main point of discussion of this resource is the detailed description of the Master File Table (MFT). This resource helps in understanding the usefulness of the NTFS in terms of efficiency and storage. The other key information of this resource is it helps in identifying different qualities of NTFS such as scalability issues, journaling issues, transactions, and encryption techniques, reparse points and interoperability. The resources was very much important to understand each of the internal as well as the external features of NTFS such as ability of managing metafiles and file compression abilities of NFTS. 3
Week 3 The National Broadband Network (NBN) is currently being rolled-out across Australia and there is a mix of technologies that are being used to deliver Internet services (for example, FTTN, FTTC, FTTP, HFC, fixed wireless and satellite). Find and summariseONEresource that describesONEof these delivery technologies. The resource, and your summary, must focus onA SINGLEtechnology. Title and Reference: Code, Security and Server Stuff. (2019).Telstra promised Fibre to the house (FTTP) when I had FTTN and this is what happened.. [online] Available at: https://fearby.com/article/telstra-promised-fibre-to-the-house-when-i-had-fttn-and- this-is-what-happened/ [Accessed 29 May 2019]. https://fearby.com/article/telstra-promised-fibre-to-the-house-when-i-had-fttn-and- this-is-what-happened/ Summary: Chosen topic: FTTN This resources is about the usefulness of FTTN which are widely used in most of the global commercial establishments such as Telstra can be understood from this resource. The resource can be very much useful to understand the usability of FTTN. The usefulness of the FTTN by the consumers of Telstra Corporation was discussed in this resource in an organized manner. The reliability of the FTN was discussed in a detailed manner in this resource. The limitation of the FTTN was discussed in this resource as well. This resources was very much useful to understand and identify the advantages as well as the limitation of FTTN. The key point of discussion of this resources is the download speed of FTTN. Based on the discussion of this paper it can be said that the download speed of FTTM is decreasing each day. The main point of discussion of this paper is the detailed conversation between a consumers of Telstra with an operator of Telstar. Theotherkeyinformationwhichcanbeidentifiedfromthisresourcesisthe advantages as well as the benefits of using FTTN. The resources highlight that the upload speed of FTTN is 400Mbps and the download speed of FTTN is 1000 Mbps. The resources were very much useful to understand that the installation of the FTTN usually takes day to one week time. 4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Week 4 The Internet is made up of many interconnected servers and networks. Users are increasingly aware and concerned that their Internet communications can be intercepted and monitored.Toris one technology that allows users to obscure or hide online their online activities. Find and summariseONEresource that describes what Tor is and how it works. The resource, and your summary, must focus purely on Tor. Title and Reference: Chosen topic:Tor Browser Porup, J. (2019).What is the Tor Browser? How it works and how protects your identity. [online] CSO Online. Available at: https://www.csoonline.com/article/3287653/what-is-the-tor-browser-how-it-works- and-how-it-can-help-you-protect-your-identity-online.html [Accessed 29 May 2019]. https://www.csoonline.com/article/3287653/what-is-the-tor-browser-how-it-works- and-how-it-can-help-you-protect-your-identity-online.html Summary: This resources sated the detailed description of the Tor browser which is increasingly used in most of the commercial establishments as well as in our society. This resources provided an in-depth discussion about the use of the Tor browser. This resource also helps in identifying that Tor can be used in most of the different categories of operating system which are used in the recent times such as Microsoft Windows and Apple Mac. Most of the privacy concerns of the tor browsers is stated in this resource which is the main reason behind selecting this resource. Tor browser can be defined as the anonymity network which can be used by the users to avoid the complexities of other operating systems such as Google Chrome and Microsoft Windows. There are different types of alternatives of the Tor browser such as Freenet, Freepto, Tails and Sub graph Operating System. The main point discussion of this resource is it helps in the identification of the stored cookies in this system. The other main point of discussion of this resources is that it helps in hiding the IP address which cannot be done in the other operating systems. This resource was selected in order to understand the that user activity of the Tor browser can be monitored and tracked which cannot be done in other browsers such as Google Chrome. 5
Week 5 An emerging form of malware is cryptojacking (also known as malicious cryptomining). Find and summariseONEresource that describes what cryptojacking is and how it works. The resource, and your summary, should focus purely on cryptojacking andNO OTHERform(s) of malware. Title and Reference: Chosen topic:Crypto-jacking Nadeau, M. (2019).What is cryptojacking? How to prevent, detect, and recover from it. [online] CSO Online. Available at: https://www.csoonline.com/article/3253572/what-is-cryptojacking-how-to-prevent- detect-and-recover-from-it.html [Accessed 29 May 2019]. https://www.csoonline.com/article/3253572/what-is-cryptojacking-how-to-prevent- detect-and-recover-from-it.html Summary: This resources was selected as it provided a detailed description of the crypto- jacking which is increasingly used in most of the commercial establishment as well as in our society. This resource helps in identifying that crypto-jacking procedure is mostly used by social engineers all around the world to load the cryto-mining code on the victims computers. The main reason behind the selection of this resources is the detaileddescriptionoftheinjectionofthecrypto-miningcodesonthevictims computer. The use of the Smominru crypto mining botnet can be understood from this resource as well. This resource was very much useful to understand that crypto jacking can be very much useful to understand the advanced technologies used by the social engineers in most of the recent cyber security attacks. Real world crypto- jacking was also discussed in this resource as well. The main reason behind the selectionofthisresourceisthedetailedimplementationofthecryptojacking procedure. The other key point of this resources is the real world examples of crypto- jacking such as the use of crypto-mining in GitHub data breach. The resource as very much useful to understand that the devices of the social engineers can be also affected during the crypto-jacking procedure. 6
Week 6 Redundancy is a critical aspect of network design, implemented in order to cope link or equipment failure. One frequent cause of failure is damage to fibre optic cables that connect countries and/or continents. Find and summariseONEresource that describesONEexample of such a cable being cut or damaged. The resource, and your summary, should describe the impacts ofA SINGLE EXAMPLEof a link failure. Note that the failure must relate to a link that connects countries and/or continents. Title and Reference: Chosen topic:Internet-cable-cut Johnson, B. (2019).Internet connection cut between Europe, Asia and Africa. [online] the Guardian. Available at: https://www.theguardian.com/world/2008/dec/21/internet-cable-cut [Accessed 27 May 2019]. https://www.theguardian.com/world/2008/dec/21/internet-cable-cut Summary: This resource is about the major incident which had an undesirable impact in our society. This resource described about the major internet blackout which affected countries from Asia, Africa and Europe. The prime reason behind the selection of this resources is the detailed description of this accident. The resources highlighted that more than 75 million internet users were affected due to a cable cut which might have occurred between Egypt and Italy. Based on the investigative sources it can be said that the damage done to cable can be due to the undersea earthquakes as well as from the anchor of the ships. The main point of discussion of this resources is the impact of this cable cut, where thousands of people could not access to the internet facilitiesevenafterhavingnumerouswirelesstechnologiesaswellasinternet connections. The undersea cable which was damaged had an undesirable impact on boththesocietiesoftheaffectedcountriesaswellasforthecommercial establishments. The entire internet traffic of the infected country was effected due to the damage done to the undersea cable. This incident also affected the entire global internet connectivity. Thus, this resource can be very much useful to understand the impact of a damage done to the undersea cables. 7
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Week 7 Since the 1990s, Enterprise Systems (also known as Enterprise Resource Planning systems) have become critical to the operation modern organisations. Over this time, ES/ERPs have evolved and continue to change in response to new demands and emerging technologies. Find and summariseONEresource that discusses emerging or future trends for ES/ERPs. The resource should be recent (published since the beginning of 2017) and it and your summary should clearly identify how ES/ERPs are, or are about to, change. Title and Reference: Chosen topic: Enterprise Resource Planning YourStory.com. (2019).Top ERP Trends of 2019 to Help you out in your Business. [online] Available at: https://yourstory.com/mystory/top-erp-trends-of-2019-to-help- you-out-in-your-bus-f581diot7c [Accessed 29 May 2019]. https://yourstory.com/mystory/top-erp-trends-of-2019-to-help-you-out-in-your-bus- f581diot7c Summary: This resource provided a detailed description of the top ERP trends of 2019. The advanced specification of the ERP is described in a detailed way in this resource. This resource was very much convenient to understand the mobile accessibility of the ERP systems. The resources stated that the improved accessibility of the RP devices can be very much beneficial for the ERP system to address the security vulnerabilities of the ERP systems. The importance of the security measures which are going to be adopted by most of the ERP systems can be identified from this resources whichis the mainreasonbehind the electionofthis resource.This resource also helps in understanding that the ERP customer can be significantly improved due to the recent modifications which are already done to the ERP systems in the last 5 years. Real time response capability of the ERP systems are very much important to understand the drastic change in the ERP architecture in the last 5 years. This resource also explained the importance of the human capabilities which are expected from the users of the ERP systems. The key which is covered in this resource is the detailed description of the future consideration of the ERP systems. The resource was very much useful to have an idea about the top ERP trends. 8
Week 8 Databases, mass data storage and interrogation technologies underpin virtually all Information Systems and applications. However, the same tools also make it easier for data breaches to occur in government departments or private companies/organisations. In simple terms, a data breach is where private information is illegally obtained or disclosed.Find and summariseONEresource that describesONEexample of a data breach that has occurred since the beginning of 2017.The resource, and your summary, should focus purely onA SINGLE EXAMPLEof a data breach. Title and Reference: Chosen topic:British Airways hacking Burgess, M. (2019).The British Airways hack is impressively bad. [online] Wired.co.uk. Available at: https://www.wired.co.uk/article/hacks-data-breaches-in- 2018 [Accessed 29 May 2019]. https://www.wired.co.uk/article/hacks-data-breaches-in-2018 Summary: This resource is very much useful to understand the hacking procedure of the British Airways. This data breaching incident occurred from 21stAugust 21 to 5thSeptember during these time the social engineers were inside the IT infrastructure of the British Airways. The main reason behind the selection of this resource is the detailed description of the data which were compromise during this security attack. This resourcehighlightedthatthepersonalinformationoftheconsumersofthis corporation as well as the financial details of the clients of this airport corporation were compromised during this hacking procedure. The most significant point of this resource is the detailed explanation of the names, email ID, personnel telephone numbers, residential address, credit card information which were stolen from the consumers of this airport.The other key information of the paper is the payment issueoftheconsumersofthisairportcorporation.Thisresourcessuccessfully describesthatmorethan380000transactionsofthisairportcorporationwere affected during this data breaching incident. This data breaching had an undesirable impact of both the business sales as well as the reputation of the British Airways. This resource was very much useful to understand the impact of a data breaching incident in the British Airways. 9
Week 9 Agile development is an iterative and incremental approach to delivering systems - it is particularly useful where the requirements are unclear or evolving. Scrum is a framework for undertaking agile development. Find and summariseONEresource that describesScrum. The resource, and your summary, should focus purely on Scrum and discuss some of its key features and attributes. Title and Reference: Chosen topic:Agile project management The Digital Project Manager. (2019).The Best Articles About Agile Project Management. [online] Available at: https://thedigitalprojectmanager.com/project- management-topics/agile-pm/ [Accessed 29 May 2019]. https://thedigitalprojectmanager.com/project-management-topics/agile-pm/ Summary: This resources provided a detailed explanation of the Agile project management approach. Detailed description of the agile project management approach was stated in the paper in an organised manner. This resource can be very much important to manage each phase of a product development project. This resource also stated about the usability and the effectiveness of the agile project management. The key point of discussion of this resource is the 12 principles of agile such as technical excellenceandtransparency,satisfactionofthiscustomer,welcomethenew change, deliver frequently, building projects, face to face time and the measurement of the progress. The four different categories of agile value is the main point of discussion of this resource. This resources can be very much beneficial for the project managers of product development projects as it can help them to manage each of the stakeholders associated with a project. The other key information of this resource is the usability of the agile methodology. The resources also helped in understanding few benefits of agile project management methodology as well the enhancedvisibilityoftheprojects.Thisresourceisalsoverymuchusefulto understand the limitation of the agile project management methodology in terms of less predictability, more commitment required from the project team members and project scheduling. 10
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Week 10 The textbook discusses activities associated with project management. However, it could be argued that project governance is equally important, especially in very large projects. Find and summariseONEresource that describes what project governance is and what activities it entails. The resource, and your summary, should focus purely on project governance. Title and Reference: Chosen topic: Project governance Weinzimer, P. (2019).How to Succeed at Project Governance. [online] CIO. Available at: https://www.cio.com/article/2693222/how-to-succeed-at-project- governance.html [Accessed 29 May 2019]. https://www.cio.com/article/2693222/how-to-succeed-at-project-governance.html Summary: This resources was very much important to understand project governance in an organized manner. The resource highlighted that project governance plan can be verymuchimportanttomanagecomplexproject.Thisresourcealsoprovided informationabouttheuseofprojectgovernanceinmostoftheglobalIT establishments. The main reason behind selecting this resource is the reliability of the data. This resource have numerous sections and each of the section is very much important to understand different aspect of project governance such as the limitations as well as the implementation of the project management strategies. The key information of this resource is the risk management ability of project governance. The robust process associated with most of the project governance can also be identified from this resource. The main point of discussion of this resources is the advantages of projectgovernancesuch as the problemsolvingability andthe disadvantages in terms of the more financial backup required for the implementation of project governance. This resource was also very much useful to understand the benefits well as the drawback of project governance in a detailed manner so that accountability of the stakeholders and transparency of the business is maintained on a long term basis. 11
MARKING SHEET - DO NOT DELETE Criteria 0No Response <=1Poor resource selection; resource is too broad or lacks relevance to the task; summary fails to explain what the resource was about; the relevance and/or usefulness of the resource has not been explained. <=2Good resource selection; resource is relevant to the task; summary is adequate but may require either more detail or is too long; the relevance and/or usefulness of the resource has been explained to some extent, but needs additional information. <=3Excellent resource selection; resource is highly relevant to the task (the resource is probably highly specialised); summary is detailed yet concise; the relevance and usefulness of the resource selection has been clearly explained. Key Deductions -3 -2 -1 Reference/URL provided does not link to resource (and resource cannot be located or determined from details provided) OR Reference/URL provided does not relate to the summary (i.e. summary is not of resource content/contains content not contained in the resource) OR Multiple resources used for a single task Resource is generic AND/OR covers multiple technologies/examples rather than focuses on a single technology/example Resource not referenced correctly/not in Harvard format WeekMarks Awarded 1 2 3 4 5 6 7 8 9 10 TOTAL Comments: 12