The resource is very much important to understand the Network Attached Storage which is a type of file storage system. The unstructured data are mainly managed with the help of the NAS such as audio, video, website, texts and Microsoft office documents.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
COIT 20246 ASSIGNMENT SUBMISSION Due date:Thursday Week 11 (2PM AEST) Part:Written Assessment Weighting:30% of total assessment. Submission:Electronic (see course website for details) Please fill in the following details: Student NameRekha Rani Student Number12114460 Tutor’s Name Instructions It will be necessary to use online resources to complete this assignment, please ensure you cite and reference any such materials using the Harvard format. DO NOTcopy content directly from either the text or Internet resources: this assignment is to be in your own words.You will lose marks if you do not use your own words! Please complete your assignment usingthissubmission templatefile, inserting your responses where indicated. DO NOT delete the marking criteria page– changes are permitted to the formatting of other pages including the headers and footers. Tasks There are ten (10) tasks, one for each week: the tasks are detailed below. There is a table to complete for each task. Please fill in the information required. Note: Each resource summary should be around 200-300 words. Each summary should briefly explain: -What the resource is about -Why you selected it -What are the main points or key information covered in the resource -Why the resource was useful. For more advice about how to complete the assignment, as well as examples and information about selecting good resources, please see the assessment page on the Moodle unit web site: https://moodle.cqu.edu.au/mod/assign/view.php?id=886270 1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Week 1 The text discusses examples of traditional mass storage such as magnetic disk and solid- state drives. While these still underpin most mass storage, in corporate environments they are often accessed via Network Attached Storage (NAS) or Storage Area Network (SAN) technologies. Find and summariseONEresource that describesEITHERNAS or SAN storage technologies. The resource, and your summary, must focus on either NAS or SAN, NOT BOTH. Title and Reference: URL: https://www.thinkmate.com/inside/articles/what-is-nas Reference:Thinkmate.com. (2019).What is NAS? - Inside Thinkmate. [online] Available at: https://www.thinkmate.com/inside/articles/what-is-nas [Accessed 29 May 2019]. Summary: The resource is very much important to understand the Network Attached Storage which is a type of file storage system. The unstructured data are mainly managed with the help of the NAS such as audio, video, website, texts and Microsoft office documents. The resource has been selected as it can explores different aspect of NAS. The main advantage of this file storage system is to enable multiusers and heterogeneous client devices, centralized disk capacity are used in this type of file storage system.The most significant constraints associated with this file storage system is that it does not have a display system. Browser based utility are used in order to configure this file storage. Along with the multi using capability there are other features of NAS such as its high accessibility and lower cost among all the other file storage systems.The NAS products are widely used in most of the global enterprises all around the world. The flexibility of service provided by NAS products helps this organization to grow over the years. The key points of the resource is its description about the different types of NAS devices. There are lots of NAS devices used in most business enterprises such as the followings: High-end or enterprise NAS:Vast quantities of file data are accessed using the enterprise NAS. Midmarket NAS:The mid-market NAS services cannot be clustered. Low-end or desktop NAS:Smaller quantities of data are accessed using desktop NAS. The resources was very much helpful to understand the specifications and categories presented by NAS. 2
Week 2 Operating systems use file managers to interact with mass storage devices. However, the way in which data is stored and retrieved is dictated by the file system. There are many types of file systems used by modern operating systems. Find and summariseONE resource that describesONEsuch file system that isNOTFAT, FAT32 or ExFAT. The resource, and your summary, must focus onA SINGLEfile system. Title and Reference: URL: https://www.techrepublic.com/article/file-systems-101-ntfs/ Reference:TechRepublic. (2019).News, Tips, and Advice for Technology Professionals - TechRepublic. [online] Available at: https://www.techrepublic.com/article/file-systems-101- ntfs/ [Accessed 29 May 2019]. Summary: This resource is very much important to understand the facilities provided by NTFS file systems. The main reason behing selecting this resource is it gives a detailed explanation of the advantages of NTFS system. The main advantage of NTFS file system is that it is very much important to store and retrieve files on a hard disk. This file system provides huge specificationsin terms ofthe performance, extendibilityand security.The most important features of the NTFS are that it helps in keeping a track of the file clusters. The governing tables are used by NTFS in order to manage each of the clusters. The other essential specification of NTFS is its ability to support larger files. The detailed description of NTFS is the key information of this resource. The access specific files are controlled with the access control list.The facility of Integrated file compression are used by NTFS regarding the management of the files which are stored in this file system. The files with longer files names are supported by NTFS. The data security offered by NTFS is much more than the other file systems used by the modern operating systems. The theoretical limits if NTFS are much higher as compared with the other file systems. This resource is very much important to deal with the security issues faced by the operating system while storing files. The resourcewas very much useful to understand that considering all the benefits offered by NTFS there are few disadvantages associated with the use of the NTFS file system such as the high space overhead,floppy discs cannot be formatted with the help of a NTFS file system and there are compatibility issues with operating system prior to Windows 2000. 3
Week 3 The National Broadband Network (NBN) is currently being rolled-out across Australia and there is a mix of technologies that are being used to deliver Internet services (for example, FTTN, FTTC, FTTP, HFC, fixed wireless and satellite). Find and summariseONEresource that describesONEof these delivery technologies. The resource, and your summary, must focus onA SINGLE technology. Title and Reference: URL: https://www.iselect.com.au/internet/nbn/fibre-to-the-node/ Reference:iSelect. (2019).Fibre To The Node - FTTN NBN Plans | iSelect Compare & Save. [online] Available at: https://www.iselect.com.au/internet/nbn/fibre-to-the-node/ [Accessed 29 May 2019]. Summary: This resource helps in understanding FTTN in a detailed manner. Introduced in the year The Fibre to the Node are used in most of the electronic devices in our daily life. The most important contribution of FTTN is its bandwidth. The efficiency of the FTTN are more than that of the FTTC. The reason behind selected this resource is to understand the limitations of FTTN. However there are few limitations associated with the use of FTTN such as its fixed range of service. DSL are used in FTTN as well as in FTTP. Most of the countries all around the world are replacing this with FTTP. The other limitations of FTTN are it is very difficult to be upgraded, at the same time it can be also said that the speed to price ration of FTTN is very poor as compared with the other internet services such as the HFC. The performance of FTTN is the key point of this resources as it states about the dependency of FTTN upon the location and other parameters such as temperature and weather. The FTTN are still used in most of the countries such as Australian, Middle East and Latin American countries. The bare foot communication modem are also uses FTTN service. The BYO modem also uses the FTTN. The BYO modems are mostly uses the FTTN service. The complexity of the FTTN equipment’s are much as compared with the other internet services such as the FTTP. The resource was helpful to understand The complexities of FTTN in a detailed manner. 4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Week 4 The Internet is made up of many interconnected servers and networks. Users are increasingly aware and concerned that their Internet communications can be intercepted and monitored.Toris one technology that allows users to obscure or hide online their online activities. Find and summariseONEresource that describes what Tor is and how it works. The resource, and your summary, must focus purely on Tor. Title and Reference: URL: https://www.csoonline.com/article/3287653/what-is-the-tor-browser-how-it-works-and-how-it- can-help-you-protect-your-identity-online.html Reference: Porup, J. (2019).What is the Tor Browser? How it works and how protects your identity. [online] CSO Online. Available at: https://www.csoonline.com/article/3287653/what-is-the- tor-browser-how-it-works-and-how-it-can-help-you-protect-your-identity-online.html [Accessed 29 May 2019]. Summary: This resources helps in understanding the Tor which is a free and open source application which are used in anonymous communication. Invented in the year 2002, The prime advantage of Tor is the main reason behind selecting this resource is that it helps in maintaining the privacy of the users who are involved in the communication process. The tor nodes are very much beneficial for the users of this technology to link with each of the identified computers systems in a connected environment. It can be said that the growth of Tor all over the world is a reflection of the huge positive impact it had on the consumers of this technology. Detailed description of the Tor browser is the key point of discussion of the resource. The Tor browsers helps in deleting the privacy sensitive data. There lots of new subsets of this technology such as the Tor Browser, Tor messenger and Tor network. However there are lots of limitations associated with this technology such as the eavesdropping, security attacks such as the traffic analysis attack, Tor exit node block, Bad apple attack, sniper attack, heart bleed bug, circuit finger printing attack. The resource was very much helpful to understand the limitation associated with this technology it restricts the useofanytorrentwebsites.Thebandwidthspeedarereducedwhileasystemusesthis technology, at the same time it can be said that the activities of Tor can be tracked easily by the social engineers. The traffic are not encrypted while using this technology as well. 5
Week 5 An emerging form of malware is cryptojacking (also known as malicious crypto mining. Find and summariseONEresource that describes what cryptojacking is and how it works. The resource, and your summary, should focus purely on cryptojacking andNO OTHER form(s) of malware. Title and Reference: URL: https://www.csoonline.com/article/3253572/what-is-cryptojacking-how-to-prevent- detect-and-recover-from-it.html Reference:Rigaud, S. (2013). https://www.app.pan.pl/article/item/app20120056.html.Acta Palaeontologica Polonica. Summary: The resource helps in understanding the concept of crypto-jacking which is an emerging form of malware which are used by the social engineers all around the world these days. Detaileddescriptionofthecryptojackingisthemainreasonbehindselectingthis resources. During this attack the social engineers sends malware links to the targets in the form of an email. The email loads crypto mining code on the computer, have script codes are also used in this attacks which helps in executing the attack. The vulnerabilities of the computer system used by the target are identified using the crypto mining code. This security concern is not easily detectable however the lagging speed of the process is an indication of this security attack. The key point of this resources is that it helps the non- technical users to understand the ways to carry out crypto jacking. However, there is a limitation associated this crypto-jacking which is that the crypto mining botnets which needs to be managed by technical skills. The CPU processing resources of the target computer are compromised during this security attack. However, it can be said that there arefewlimitationsassociatedwithcrypto-jackingwasthemainusefulnessofthis resources as the devices of the cyber criminals may get damaged while conducting the attack. The crypto currencies are the form of transactions which are preferred by the social engineers. Week 6 Redundancy is a critical aspect of network design, implemented in order to cope link or equipment failure. One frequent cause of failure is damage to fibre optic cables that connect countries and/or 6
continents. Find and summariseONEresource that describesONEexample of such a cable being cut or damaged.The resource, and your summary, should describe the impacts ofA SINGLE EXAMPLEof a link failure.Note that the failure must relate to a link that connects countries and/or continents. Title and Reference: URL: https://www.independent.co.uk/news/world/africa/mauritiana-internet-cut-underwater-cable- offline-days-west-africa-a8298551.html Reference:https://www.independent.co.uk. (2018).Entire country taken offline for two days after undersea internet cable cut. [online] Available at: https://www.independent.co.uk/news/world/africa/mauritiana-internet-cut-underwater-cable-offline- days-west-africa-a8298551.html [Accessed 20 Apr. 2019]. Summary: This resource helps in understanding the example of a link failure of an underwater internet cable cut. This link failure has resulted in the internet outage for 48 hours across Europe to Africa on 10th April 2018.Detailed description of a link failure was discussed in this resources which is the msin reason behind selecting this resource. The cable system is 10500 miles which starts from France and stretches to South Africa covering more than 22 countries. The link failure occurred in Maurianian capital Noukachhot as the cable system was intercepted by a trawler. The countries which faced disruption are Liberia, Guinea, Gambia, Sierra Leone and Ivory Coast. The ACE cable system disruption has resulted in internet outage in across north western countries of Africa. The most significant point of this resources is its detailed analysis of the impact of the link failure on the national economy of the affected countries. Along with the difference in duration this accident had a negative impact on the terrestrial internet connections also. Several maintenance vesselsweresenttothelocationtorepairthedamagedcablesystembuttheadverse environmental conditions delayed the entire repairing process. This accident has resulted in internet problems in other central African nations also such as Zimbabwe. After this submarine cablesystemisdamaged,alltheotherassociatednetworksarealsocompromised.The infrastructure analysis of the entire region was required so that there are no security issues after the disruption. Thus the resource was very much useful to understand the impact of a link failure causes due to redundancy. 7
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Week 7 Since the 1990s, Enterprise Systems (also known as Enterprise Resource Planning systems) have become critical to the operation modern organisations. Over this time, ES/ERPs have evolved and continue to change in response to new demands and emerging technologies. Find and summariseONEresource that discusses emerging or future trends for ES/ERPs. The resource should be recent (published since the beginning of 2017) and it and your summary should clearly identify how ES/ERPs are, or are about to, change. Title and Reference: URL:https://www.managementstudyguide.com/enterprise-resource-planning-1-articles.htm Reference:Managementstudyguide.com. (2019).Enterprise Resource Planning - I Articles. [online] Available at: https://www.managementstudyguide.com/enterprise-resource-planning- 1-articles.htm [Accessed 29 May 2019]. Summary: The resources helps in understanding the importance of ERP to manage the business process of enterprises such as their customer service department, corporate performance andgovernance,accounting,distributionofproducts,humanresourcedepartmentand sales.The reason behind selecting this resource is to have an idea about the practical implementation of the ERP system. This business management software can be very much beneficial for business enterprises to track their business resources such as the finance coming from the management team, raw materials and production. The versions of the ERP has changed considerably over the years. The future of the ERP systems is the key point of this resourceas it states about the much promising in nature as new patches are readily releasing every now and then as per the business requirements. The needs and requirements of the consumers of the business sets the parameters for the new specifications of the ERP system. The resource was very much helpful to understand the advantages of ERP systems as it helps in improving the quality of products and service which are offered to the consumers of the business. The decision making of business organizations can be also done in a better way with the help of the ERP systems, at the same time it can be also said that the data security of business organizations can be also managed using the ERP system. However the limitation of the ERP system it that it cannot be entirely customised by the users of the ERP systems. The switching cost of the ERP systems is also a source of concern for the ERP system. The resources was useful to it highlights both the benefits as well as the limitations of the ERP systems. 8
Week 8 Databases,massdatastorageandinterrogationtechnologiesunderpinvirtuallyall Information Systems and applications.However, the same tools also make it easier for data breaches to occur in government departments or private companies/organisations. In simpleterms,adatabreachiswhereprivateinformationisillegallyobtainedor disclosed.Find and summariseONEresource that describesONEexample of a data breach that has occurred since the beginning of 2017.The resource, and your summary, should focus purely onA SINGLE EXAMPLEof a data breach. Title and Reference: URL: https://www.nytimes.com/2018/04/04/us/politics/cambridge-analytica-scandal- fallout.html Reference:Nytimes.com. (2019).Cambridge Analytica and Facebook: The Scandal and the Fallout So Far. [online] Available at: https://www.nytimes.com/2018/04/04/us/politics/cambridge-analytica-scandal-fallout.html [Accessed 29 May 2019]. Summary: This resources focus is about the data breaching event which had a direct negative impact on Facebook Corporation. This cyber security issue was detected in 1StMay 2018 before the general elections of USA. Cambridge Analytica Ltd is a British organization which is a political consulting firm. As a result if this data breach, Donald Trump made the most out of thus security breach. The resources was selected to have an idea about the impact of a data security breach in the entire political scenario of the world. The presidential campaign of Donald Trump was boosted with the help of this security breach. This data breaching event had a negative impact on the political map of USA as well as its allies such as England and Spain. Millions of data were breached ad a result of this attack, the data came from the Facebook users. The impact of this security breach is the key point of discussion in the resource as it states that the personal information of the Facebook users were altered and used in election campaigns. The role of the hackers were very much important as they hacked the account of more than 50 million Facebook profiles. The users were not aware of this security concern for many days. This data breach had a directresultonboththeefficiencyandproductivityoftheFacebook,thebusiness reputation of Facebook was badly damaged as a result of this attack. The security policies of Facebook was revised after this security attack. Thus, the resources was very much useful to understand the negative impact of a data security breach. 9
10 Week 9 Agiledevelopmentisaniterativeandincrementalapproachtodeliveringsystems-itis particularly useful where the requirements are unclear or evolving.Scrum is a framework for undertaking agile development. Find and summariseONEresource that describesScrum.The resource, and your summary, should focus purely on Scrum and discuss some of its key features and attributes. Title and Reference: URL:https://www.simplilearn.com/scrum-project-management-article Reference:Simplilearn.com. (2019).Scrum Project Management Pros and Cons | CSM Training. [online] Available at: https://www.simplilearn.com/scrum-project-management-article [Accessed 29 May 2019]. Summary: This resource is about understanding the importance of the scrum project management methodology which is extensively used in most of the business organizations. There are lots of advantages and disadvantages associated with this project management methodology which is the reason behind selecting this paper. Both the internal as well as the external stakeholders of the business can be benefitted from the use of this project management methodology. The prime benefit of this project management methodology is the main point of discussion of the paper it states that it can be used in most of the ICT organizations all around the world considering the outsourcing projects. The market strategies of the IT products can be also set with the help of the Scrum project management methodology. Deadline and budget of the IT projects can be also managed with the help of the project management methodology. The human resources of the IT projects can be also managed in an organized manner with the help of this project management methodology. The disadvantages of this project management is that the entire structure of the business has to be restricted after the implementation of this methodology. The resources of the project may needed to be changed as this critical project management methodology helps in identifying all the complexities of the projects in terms of the parameters of the project such as the resources. The resources was very much helpful to understand scrum project management methodology in a detailed manner.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
11 Week 10 The textbook discusses activities associated with project management. However, it could be argued that project governance is equally important, especially in very large projects. Find and summariseONEresource that describes what project governance is and what activities it entails. The resource, and your summary, should focus purely on project governance. Title and Reference: URL:https://www.cio.com/article/2693222/how-to-succeed-at-project-governance.html Reference:Weinzimer, P. (2019).How to Succeed at Project Governance. [online] CIO. Availableat:https://www.cio.com/article/2693222/how-to-succeed-at-project- governance.html [Accessed 29 May 2019]. Summary: Thisresourceis aboutunderstandingthe importanceofprojectgovernanceinproject management procedures. There are numerous benefits and limitations associated with the use of the concept of project governance in project management procedures. The reason behind selecting this resource is it helps in understand the impact of project management in a descriptive manner. The prime benefits of project governance is its ability to improve the decision making process for the business organizations. The selection of the professional stakeholders of the project is the other advantage of project governance. The practise of the project governance is also very much important to complete the project within the estimated time period as confirmed in the planning phase of the projects. The regulations, processes and the responsibilities of each of the stakeholders involved in a project can be determined with the help of project governance. Portfolios can be also created for the employees of business organizations with the help of the project governance plan, The factors causing robustness in the projects can be also managed with the help of the project governance. Along with these benefits there are lots of challenges associated with the project governance such which are the other key points of this resource as the business risks of the project as the market condition of each of the products are always dynamic in nature. The external stakeholders of the projects are very much difficult to be integrated within the project governanceprocedureswhicharegenerallyappliedbymostoftheglobalbusiness organizations.Thus,theresourcewasverymuchhelpfultounderstandwhatproject governance is and what are the prime activities of project management.
12 MARKING SHEET - DO NOT DELETE Criteria 0No Response <=1Poor resource selection; resource is too broad or lacks relevance to the task; summary fails to explain what the resource was about; the relevance and/or usefulness of the resource has not been explained. <=2Good resource selection; resource is relevant to the task; summary is adequate but may require either more detail or is too long; the relevance and/or usefulness of the resource has been explained to some extent, but needs additional information. <=3Excellent resource selection; resource is highly relevant to the task (the resource is probably highly specialised); summary is detailed yet concise; the relevance and usefulness of the resource selection has been clearly explained. Key Deductions -3 -2 -1 Reference/URL provided does not link to resource (and resource cannot be located or determined from details provided) OR Reference/URL provided does not relate to the summary (i.e. summary is not of resource content/contains content not contained in the resource) OR Multiple resources used for a single task Resource is generic AND/OR covers multiple technologies/examples rather than focuses on a single technology/example Resource not referenced correctly/not in Harvard format WeekMarks Awarded 1 2 3 4 5 6 7 8 9 10 TOTAL Comments: