COIT Submission Assignment 2022.
VerifiedAdded on 2022/10/11
|13
|5002
|12
Assignment
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
COIT 20246 ASSIGNMENT SUBMISSION
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Please fill in the following details:
Student Name
Student Number
Tutor’s Name
Instructions
It will be necessary to use online resources to complete this assignment, please
ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use
your own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is
a table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Each summary should briefly explain:
- What the resource is about
- Why you selected it
- What are the main points or key information covered in the resource
- Why the resource was useful.
For more advice about how to complete the assignment, as well as examples and
information about selecting good resources, please see the assessment page on the
Moodle unit web site:
https://moodle.cqu.edu.au/mod/assign/view.php?id=965540
1
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Please fill in the following details:
Student Name
Student Number
Tutor’s Name
Instructions
It will be necessary to use online resources to complete this assignment, please
ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use
your own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is
a table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Each summary should briefly explain:
- What the resource is about
- Why you selected it
- What are the main points or key information covered in the resource
- Why the resource was useful.
For more advice about how to complete the assignment, as well as examples and
information about selecting good resources, please see the assessment page on the
Moodle unit web site:
https://moodle.cqu.edu.au/mod/assign/view.php?id=965540
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Example
The “Internet of things” is an emerging trend towards smart interconnected embedded
technologies that allow us to monitor and control our environment. Collect and summarise
an online resource that describes ONE example or application of the Internet of things.
Title, Link and Reference:
Connected Medical Devices, Apps: Are They Leading the IoT Revolution — or Vice Versa?
https://www.wired.com/insights/2014/06/connected-medical-devices-apps-leading-iot-
revolution-vice-versa/
Lars, N 2014, ‘Connected Medical Devices, Apps: Are They Leading the IoT Revolution —
or Vice Versa?’, Wired, June 2014, viewed 1 February 2017,
https://www.wired.com/insights/2014/06/connected-medical-devices-apps-leading-iot-
revolution-vice-versa/
Note: You may use abbreviated URLs (to the website) in the reference, however you must
provide the FULL link above it that, when pasted into the Web Browser, will take the
marker directly to the resource. Using full URLs in the reference (as in this example) is fine
too.
Summary:
Connected Medical Devices, Apps: Are They Leading the IoT Revolution — or Vice Versa?
This article describes the emergence of the Internet of Things (IoT) in the context of
medical devices. I chose this article because it not only examines the applications of a
very useful class of IoT devices, but it also highlights the need for ways of collecting and
processing the data they produce.
In the article, the author describes how many medical monitoring devices are now capable
of connecting to the Internet and are becoming a normal part of patient care. These
devices allow remote monitoring of patient health wirelessly and can collect data on a wide
range of vital signs and indicators. Data can be collected from a range of sensors reading
everything from heart rate and blood pressure through to blood sugar levels and
temperature.
In addition to passive monitors, IoT medical devices provide the ability to proactively
prompt patients to do things, for example to warn them of their blood pressure or to alert
them that they need more medication. The article points out that many of these
notifications are the result of apps (software) interacting with both the devices and the
patients.
Perhaps the most interesting aspect of the article is the author’s discussion of what
happens to the data that the IoT medical devices produce. The author explains that many
devices can send data directly to the cloud for storage and analysis and that this data
constitutes a wealth of information that will potentially improve healthcare in the future.
I found this article useful because it not only highlighted the increasing ubiquity of Internet-
connected medical devices, but also made me think about how the data is collected, where
it is stored and how it could be used – positively and negatively – in the future.
2
The “Internet of things” is an emerging trend towards smart interconnected embedded
technologies that allow us to monitor and control our environment. Collect and summarise
an online resource that describes ONE example or application of the Internet of things.
Title, Link and Reference:
Connected Medical Devices, Apps: Are They Leading the IoT Revolution — or Vice Versa?
https://www.wired.com/insights/2014/06/connected-medical-devices-apps-leading-iot-
revolution-vice-versa/
Lars, N 2014, ‘Connected Medical Devices, Apps: Are They Leading the IoT Revolution —
or Vice Versa?’, Wired, June 2014, viewed 1 February 2017,
https://www.wired.com/insights/2014/06/connected-medical-devices-apps-leading-iot-
revolution-vice-versa/
Note: You may use abbreviated URLs (to the website) in the reference, however you must
provide the FULL link above it that, when pasted into the Web Browser, will take the
marker directly to the resource. Using full URLs in the reference (as in this example) is fine
too.
Summary:
Connected Medical Devices, Apps: Are They Leading the IoT Revolution — or Vice Versa?
This article describes the emergence of the Internet of Things (IoT) in the context of
medical devices. I chose this article because it not only examines the applications of a
very useful class of IoT devices, but it also highlights the need for ways of collecting and
processing the data they produce.
In the article, the author describes how many medical monitoring devices are now capable
of connecting to the Internet and are becoming a normal part of patient care. These
devices allow remote monitoring of patient health wirelessly and can collect data on a wide
range of vital signs and indicators. Data can be collected from a range of sensors reading
everything from heart rate and blood pressure through to blood sugar levels and
temperature.
In addition to passive monitors, IoT medical devices provide the ability to proactively
prompt patients to do things, for example to warn them of their blood pressure or to alert
them that they need more medication. The article points out that many of these
notifications are the result of apps (software) interacting with both the devices and the
patients.
Perhaps the most interesting aspect of the article is the author’s discussion of what
happens to the data that the IoT medical devices produce. The author explains that many
devices can send data directly to the cloud for storage and analysis and that this data
constitutes a wealth of information that will potentially improve healthcare in the future.
I found this article useful because it not only highlighted the increasing ubiquity of Internet-
connected medical devices, but also made me think about how the data is collected, where
it is stored and how it could be used – positively and negatively – in the future.
2
Week 1
The text discusses about different architectures for parallel processing used for
Multiprocessor Machines such as multiple-instruction stream - multiple-data stream
(MIMD), single-instruction stream - multiple-data stream (SIMD) etc. Find and
summarise ONE resource that compares between MIMD and SIMD architectures.
The resource, and your summary, must focus only on MIMD and SIMD architectures.
Title, Link and Reference:
Differences between SIMD and MIMD
https://www.geeksforgeeks.org/difference-between-simd-and-mimd/
GeeksforGeeks. (2019). Difference between SIMD and MIMD - GeeksforGeeks.
[online] Available at: https://www.geeksforgeeks.org/difference-between-simd-and-
mimd/ [Accessed 26 Sep. 2019].
Summary:
Differences between SIMD and MIMD
This article describes the comparison between the MIMD and SIMD architecture. I
choose this article because this article elaborates clearly the comparison between
SIMD and MIMD architecture. The abbreviation of SIMD is known as Single
Instruction Multiple Data but MIMD is known as Multiple Instructions Single Data.
SIMD needs very less amounts of memory but MIMD needs a huge amount of
memory. The cost of SIMD is lesser than the MIMD. MIMD is costlier than SIMD.
SIMD has only single decoder but MIMD has multiple decoder. SIMD is a
synchronous programming whereas MIMD is asynchronous programming. SIMD is
simpler than MIMD but MIMD is more complex than SIMD. SIMD is less efficient than
MIMD in terms of performance but MIMD is more efficient than SIMD in terms of
performance. SIMD is tacit synchronization but MIMD has accurate or explicit
synchronization. SIMD has a single decoder but MIMD has multiple decoders.
Week 2
The text discusses about one of the common problems that can arise during
resource allocation in operating systems, which is known as deadlock.Find and
summarise ONE resource that describesan algorithm of either deadlock avoidance
or deadlock prevention. The resource, and your summary, must focus on a single
algorithm of either deadlock avoidance or deadlock prevention, NOT both.
Title, Link and Reference:
Reliable Resource Provisioning Using Bankers’ Deadlock Avoidance Algorithm in
MEC for Industrial IoT
https://dr.ntu.edu.sg/bitstream/handle/10220/43545/Collision%20and%20deadlock
%20avoidance%20in%20multi-robot%20systems%20with%20labeled%20transition
%20systems.pdf?sequence=1
Ugwuanyi, E.E., Ghosh, S., Iqbal, M. and Dagiuklas, T., 2018. Reliable resource
provisioning using Bankers’ deadlock avoidance algorithm in MEC for industrial
IoT. IEEE Access, 6, pp.43327-43335.
Summary:
Reliable Resource Provisioning Using Bankers’ Deadlock Avoidance Algorithm in
MEC for Industrial IoT
This article describes the deadlock avoidance mechanism. I choose this article
because this article elaborates clearly regarding deadlock avoidance. In the article,
the author describes the banker’s algorithm in detail. It is used for allocating the
resources and avoiding the deadlock. It is used to test all the available requests
3
The text discusses about different architectures for parallel processing used for
Multiprocessor Machines such as multiple-instruction stream - multiple-data stream
(MIMD), single-instruction stream - multiple-data stream (SIMD) etc. Find and
summarise ONE resource that compares between MIMD and SIMD architectures.
The resource, and your summary, must focus only on MIMD and SIMD architectures.
Title, Link and Reference:
Differences between SIMD and MIMD
https://www.geeksforgeeks.org/difference-between-simd-and-mimd/
GeeksforGeeks. (2019). Difference between SIMD and MIMD - GeeksforGeeks.
[online] Available at: https://www.geeksforgeeks.org/difference-between-simd-and-
mimd/ [Accessed 26 Sep. 2019].
Summary:
Differences between SIMD and MIMD
This article describes the comparison between the MIMD and SIMD architecture. I
choose this article because this article elaborates clearly the comparison between
SIMD and MIMD architecture. The abbreviation of SIMD is known as Single
Instruction Multiple Data but MIMD is known as Multiple Instructions Single Data.
SIMD needs very less amounts of memory but MIMD needs a huge amount of
memory. The cost of SIMD is lesser than the MIMD. MIMD is costlier than SIMD.
SIMD has only single decoder but MIMD has multiple decoder. SIMD is a
synchronous programming whereas MIMD is asynchronous programming. SIMD is
simpler than MIMD but MIMD is more complex than SIMD. SIMD is less efficient than
MIMD in terms of performance but MIMD is more efficient than SIMD in terms of
performance. SIMD is tacit synchronization but MIMD has accurate or explicit
synchronization. SIMD has a single decoder but MIMD has multiple decoders.
Week 2
The text discusses about one of the common problems that can arise during
resource allocation in operating systems, which is known as deadlock.Find and
summarise ONE resource that describesan algorithm of either deadlock avoidance
or deadlock prevention. The resource, and your summary, must focus on a single
algorithm of either deadlock avoidance or deadlock prevention, NOT both.
Title, Link and Reference:
Reliable Resource Provisioning Using Bankers’ Deadlock Avoidance Algorithm in
MEC for Industrial IoT
https://dr.ntu.edu.sg/bitstream/handle/10220/43545/Collision%20and%20deadlock
%20avoidance%20in%20multi-robot%20systems%20with%20labeled%20transition
%20systems.pdf?sequence=1
Ugwuanyi, E.E., Ghosh, S., Iqbal, M. and Dagiuklas, T., 2018. Reliable resource
provisioning using Bankers’ deadlock avoidance algorithm in MEC for industrial
IoT. IEEE Access, 6, pp.43327-43335.
Summary:
Reliable Resource Provisioning Using Bankers’ Deadlock Avoidance Algorithm in
MEC for Industrial IoT
This article describes the deadlock avoidance mechanism. I choose this article
because this article elaborates clearly regarding deadlock avoidance. In the article,
the author describes the banker’s algorithm in detail. It is used for allocating the
resources and avoiding the deadlock. It is used to test all the available requests
3
made for the processes for the resources. It is used to check the safe state that
allows the request. If there is no safe state then it does not allow the request
generated by the process. Input to the banker’s algorithm includes the maximum
requirement of the resources by every process. They are allocating the resources by
every process at the current scenario. It has a maximum amount of free available
resources in the system. The request will be granted for some conditions. If the
request is lesser than or equal to the requirement of that process and the request is
made by the process is less than equal to the freely available resources. There is one
Algorithm named Banker’s Safety Algorithm. Let the work and Finish be the vectors
of length m and n only. Initially : Work= Available, Finish[i]=false; for i=0,1,2,3,4…n.
For finding i such that both Finish[i]=false, Need[i]= false. If there is no such work
then goto the step number 4. Now, Work=Work+Allocation[i], Finish[i]=true, goto step
2. If Finish[i]=true for all I then system is in safe state.
4
allows the request. If there is no safe state then it does not allow the request
generated by the process. Input to the banker’s algorithm includes the maximum
requirement of the resources by every process. They are allocating the resources by
every process at the current scenario. It has a maximum amount of free available
resources in the system. The request will be granted for some conditions. If the
request is lesser than or equal to the requirement of that process and the request is
made by the process is less than equal to the freely available resources. There is one
Algorithm named Banker’s Safety Algorithm. Let the work and Finish be the vectors
of length m and n only. Initially : Work= Available, Finish[i]=false; for i=0,1,2,3,4…n.
For finding i such that both Finish[i]=false, Need[i]= false. If there is no such work
then goto the step number 4. Now, Work=Work+Allocation[i], Finish[i]=true, goto step
2. If Finish[i]=true for all I then system is in safe state.
4
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Week 3
Internet of things (IoT) is an emerging trend towards smart interconnected embedded
technologies that allow us to monitor and control our environment. Find and
summarise ONE resource that describe applications of the Internet of things in the
field of Smart Farming.The resource, and your summary, must focus on application
of IoTONLY in the field of smart farming.
Title, Link and Reference:
Internet of Things Platform for Smart Farming: Experiences and Lessons Learnt
https://www.mdpi.com/1424-8220/16/11/1884
Jayaraman, P., Yavari, A., Georgakopoulos, D., Morshed, A. and Zaslavsky, A.,
2016. Internet of things platform for smart farming: Experiences and lessons
learnt. Sensors, 16(11), p.1884.
Summary:
Internet of Things Platform for Smart Farming: Experiences and Lessons Learnt
This article describes the Internet of Things Platform for Smart Farming. I choose this
article because this article elaborates clearly the Internet of Things Platform for
Smart Farming. In the article, the author elaborates the Internet of Things Platform
for Smart Farming in detail. Improving the productivity of the farm needs the
performance of the crop to be understood and is delivered under a huge variety of
environments as well as soil and condition of irrigation. Phenonet is an agricultural
laboratory that includes sensor networks, Internet Protocol cameras, mobile
smartphones, and associated data analysis. This enables the real-time capturing of
the crop data for assessing and predicting the performance of the crop for any kind of
soil, fertilization, conditions of irrigations including the condition of weather, soil
moisture, quality of soil and many others. It is used to detect the influence of several
conditions on different types of crops in the real world outdoor environments. It is
used to understand different sources of water for efficiently managing this. It is used
to perform the research of different fertilizers. By using this real-time data will be
achieved by forecasting the performance of the crop. It is used to share data. For
better explaining the Phenonet, the author provides the extra details about the
sample studies for conducting in Phenonet. The target of this research is to evaluate
the result of sheep grazing on the regrowth of the crop by viewing at the activity at
the grass-root level.
In this particular research, the sensor of moisture of the soil designed at more than
one depth and sensors of the canopy temperature is used to track to the roots of the
crop. It also describes the procedures of removing the water from the soil in the total
season. This information is used to calculate and assess the root activity and growth
of the crop. In this article, it is mentioned that the Phenonet study is conducted on a
block of land that is divided into hundreds of plots. A plot is termed as the
intersection of a row and the column in the block of land. It requires a real-time
collection and delivery of the information to the biologists. They can share the
insights for growers as well as farmers.
Week 4
The text discusses about IPv4,however, IPv6 is the emerging protocol which is in the
process of superseding IPv4.Find and summarise ONE resource that describes
about the technologies that are used to run both protocols simultaneously over the
5
Internet of things (IoT) is an emerging trend towards smart interconnected embedded
technologies that allow us to monitor and control our environment. Find and
summarise ONE resource that describe applications of the Internet of things in the
field of Smart Farming.The resource, and your summary, must focus on application
of IoTONLY in the field of smart farming.
Title, Link and Reference:
Internet of Things Platform for Smart Farming: Experiences and Lessons Learnt
https://www.mdpi.com/1424-8220/16/11/1884
Jayaraman, P., Yavari, A., Georgakopoulos, D., Morshed, A. and Zaslavsky, A.,
2016. Internet of things platform for smart farming: Experiences and lessons
learnt. Sensors, 16(11), p.1884.
Summary:
Internet of Things Platform for Smart Farming: Experiences and Lessons Learnt
This article describes the Internet of Things Platform for Smart Farming. I choose this
article because this article elaborates clearly the Internet of Things Platform for
Smart Farming. In the article, the author elaborates the Internet of Things Platform
for Smart Farming in detail. Improving the productivity of the farm needs the
performance of the crop to be understood and is delivered under a huge variety of
environments as well as soil and condition of irrigation. Phenonet is an agricultural
laboratory that includes sensor networks, Internet Protocol cameras, mobile
smartphones, and associated data analysis. This enables the real-time capturing of
the crop data for assessing and predicting the performance of the crop for any kind of
soil, fertilization, conditions of irrigations including the condition of weather, soil
moisture, quality of soil and many others. It is used to detect the influence of several
conditions on different types of crops in the real world outdoor environments. It is
used to understand different sources of water for efficiently managing this. It is used
to perform the research of different fertilizers. By using this real-time data will be
achieved by forecasting the performance of the crop. It is used to share data. For
better explaining the Phenonet, the author provides the extra details about the
sample studies for conducting in Phenonet. The target of this research is to evaluate
the result of sheep grazing on the regrowth of the crop by viewing at the activity at
the grass-root level.
In this particular research, the sensor of moisture of the soil designed at more than
one depth and sensors of the canopy temperature is used to track to the roots of the
crop. It also describes the procedures of removing the water from the soil in the total
season. This information is used to calculate and assess the root activity and growth
of the crop. In this article, it is mentioned that the Phenonet study is conducted on a
block of land that is divided into hundreds of plots. A plot is termed as the
intersection of a row and the column in the block of land. It requires a real-time
collection and delivery of the information to the biologists. They can share the
insights for growers as well as farmers.
Week 4
The text discusses about IPv4,however, IPv6 is the emerging protocol which is in the
process of superseding IPv4.Find and summarise ONE resource that describes
about the technologies that are used to run both protocols simultaneously over the
5
same internet infrastructure.
Title, Link and Reference:
Internet of Things for Smart Cities
https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6740844
Zanella, A., Bui, N., Castellani, A., Vangelista, L. and Zorzi, M., 2014. Internet of
things for smart cities. IEEE Internet of Things journal, 1(1), pp.22-32.
Summary:
Internet of Things for Smart Cities
This method is used to map the IPv4 address and TCP/UDP ports into the IPv6
address. It describes the classical Network Address and Port Translation service. It is
contained by many numbers of LANs to give access to the internet to the number of
host n any kind of private network by sharing this to the common public IPv4
address. It is described to address over the public internet. When a packet is
returned to the common address of IPv4 the edge router supporting the NATP
service will take the packet and replace the IPv4 destination address of the targeted
server. This methodology can be used to map more than one number of IPv6
addresses into a single IPv4 public address.
This methodology needs the connection to be initiated by the IPv6 nodes in the order
to generate the correct entries in the NATP lookup table. Connections are initiated
from the IPv4 cloud. It can be understood very easily. This needs a very complex
architecture. This IPv6 network consists of a local Domain Name Server. It is
statistically attached to the IPv4 address in the NATP translation table. On the same
line of air quality and noise monitoring, a possible smart city services can be enabled
by urban IoT/. It consists in investing the traffic congestion in that particular city. The
camera based monitoring systems are also available.
6
Title, Link and Reference:
Internet of Things for Smart Cities
https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6740844
Zanella, A., Bui, N., Castellani, A., Vangelista, L. and Zorzi, M., 2014. Internet of
things for smart cities. IEEE Internet of Things journal, 1(1), pp.22-32.
Summary:
Internet of Things for Smart Cities
This method is used to map the IPv4 address and TCP/UDP ports into the IPv6
address. It describes the classical Network Address and Port Translation service. It is
contained by many numbers of LANs to give access to the internet to the number of
host n any kind of private network by sharing this to the common public IPv4
address. It is described to address over the public internet. When a packet is
returned to the common address of IPv4 the edge router supporting the NATP
service will take the packet and replace the IPv4 destination address of the targeted
server. This methodology can be used to map more than one number of IPv6
addresses into a single IPv4 public address.
This methodology needs the connection to be initiated by the IPv6 nodes in the order
to generate the correct entries in the NATP lookup table. Connections are initiated
from the IPv4 cloud. It can be understood very easily. This needs a very complex
architecture. This IPv6 network consists of a local Domain Name Server. It is
statistically attached to the IPv4 address in the NATP translation table. On the same
line of air quality and noise monitoring, a possible smart city services can be enabled
by urban IoT/. It consists in investing the traffic congestion in that particular city. The
camera based monitoring systems are also available.
6
Week 5
Network security has become a major concern of ICT world, and user authentication
is one of the popular toolsto assure network security. Find and summarise ONE
resource that describesanyONE authentication mechanism except password. The
resource, and your summary, should focus purely onONLYONE type of
authentication mechanism.
Title, Link and Reference:
A Lightweight Multicast Authentication Mechanism for Small Scale IoT Applications
https://www.researchgate.net/profile/Xiaojiang_Du/publication/
260636721_A_Lightweight_Multicast_Authentication_Mechanism_for_Small_Scale_I
oT_Applications/links/57cc78e108ae59825185db3a.pdf
Yao, X., Han, X., Du, X. and Zhou, X., 2013. A lightweight multicast authentication
mechanism for small scale IoT applications. IEEE Sensors Journal, 13(10), pp.3693-
3701.
Summary:
A Lightweight Multicast Authentication Mechanism for Small Scale IoT Applications
This article discusses the lightweight multicast authentication for Small Scale IoT
applications. A multicast IoT mechanism can be easily attacked if no security
mechanism is used. That is why the lightweight authentication mechanism is required
to protect the multicast messages. It is only main calculation to ensure the
authenticity of the received multicast data. Many broadcasts, as well as multicast
authentication mechanisms, have been proposed for wireless sensor networks.
These mechanisms are the basis of the security related to the Internet of Things. But
most of this mechanism does not satisfy all the seven required properties. These
rules are proposed by Luk. Inspired by the properties of the Nyberg’s fast one-way
accumulator the author presents a multicast authentication mechanism for the small
scale applications of Internet of Things. It can satisfy the needs of multicast
authentication.
The contribution of the author is summarized as follows. At first, the author covers
that the Nyberg’s fast procedure of one way accumulator has a property of
absorbance in addition to the one way as well as quasi communicative properties.
This makes it applicable where the accumulated items are dynamic. Secondly, the
author makes two modifications for making this appropriate for the Nyberg’s fast one-
way accumulator. Thirdly, the author designs a lightweight multicast authentication
methodology for small scale application of the Internet of Things. Fourthly, depending
on the theory of probability the author demonstrates the security analysis. It is used
to evaluate the seven performance aspects of the proposed multicast authentication
scheme.
Week 6
The text discusses about a massive data breach that happened in Target company,
which is referred as ‘Target Breach’. Find and summarise ONE resource that
describesanother recent (within last 5 years) well-publicised attack or security breach
on a public company or government organisation.The resource, and your summary,
should describe about A SINGLE EXAMPLE of security breach.
Title, Link and Reference:
An Analysis of Information Security Vulnerabilities at Three Australian Government
7
Network security has become a major concern of ICT world, and user authentication
is one of the popular toolsto assure network security. Find and summarise ONE
resource that describesanyONE authentication mechanism except password. The
resource, and your summary, should focus purely onONLYONE type of
authentication mechanism.
Title, Link and Reference:
A Lightweight Multicast Authentication Mechanism for Small Scale IoT Applications
https://www.researchgate.net/profile/Xiaojiang_Du/publication/
260636721_A_Lightweight_Multicast_Authentication_Mechanism_for_Small_Scale_I
oT_Applications/links/57cc78e108ae59825185db3a.pdf
Yao, X., Han, X., Du, X. and Zhou, X., 2013. A lightweight multicast authentication
mechanism for small scale IoT applications. IEEE Sensors Journal, 13(10), pp.3693-
3701.
Summary:
A Lightweight Multicast Authentication Mechanism for Small Scale IoT Applications
This article discusses the lightweight multicast authentication for Small Scale IoT
applications. A multicast IoT mechanism can be easily attacked if no security
mechanism is used. That is why the lightweight authentication mechanism is required
to protect the multicast messages. It is only main calculation to ensure the
authenticity of the received multicast data. Many broadcasts, as well as multicast
authentication mechanisms, have been proposed for wireless sensor networks.
These mechanisms are the basis of the security related to the Internet of Things. But
most of this mechanism does not satisfy all the seven required properties. These
rules are proposed by Luk. Inspired by the properties of the Nyberg’s fast one-way
accumulator the author presents a multicast authentication mechanism for the small
scale applications of Internet of Things. It can satisfy the needs of multicast
authentication.
The contribution of the author is summarized as follows. At first, the author covers
that the Nyberg’s fast procedure of one way accumulator has a property of
absorbance in addition to the one way as well as quasi communicative properties.
This makes it applicable where the accumulated items are dynamic. Secondly, the
author makes two modifications for making this appropriate for the Nyberg’s fast one-
way accumulator. Thirdly, the author designs a lightweight multicast authentication
methodology for small scale application of the Internet of Things. Fourthly, depending
on the theory of probability the author demonstrates the security analysis. It is used
to evaluate the seven performance aspects of the proposed multicast authentication
scheme.
Week 6
The text discusses about a massive data breach that happened in Target company,
which is referred as ‘Target Breach’. Find and summarise ONE resource that
describesanother recent (within last 5 years) well-publicised attack or security breach
on a public company or government organisation.The resource, and your summary,
should describe about A SINGLE EXAMPLE of security breach.
Title, Link and Reference:
An Analysis of Information Security Vulnerabilities at Three Australian Government
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Organisations
http://citeseerx.ist.psu.edu/viewdoc/download?
doi=10.1.1.663.2951&rep=rep1&type=pdf
Parsons, K., McCormac, A., Pattinson, M.R., Butavicius, M.A. and Jerram, C., 2013.
An Analysis of Information Security Vulnerabilities at Three Australian Government
Organisations. In EISMC (pp. 34-44).
Summary:
An Analysis of Information Security Vulnerabilities at Three Australian Government
Organisations
In this article, the author describes the security breaches of an organization. This
report clearly describes this incident. This article is chosen because in this article this
type of thing is explained very carefully. In September 2018, Facebook disclosed that
an attack on its computer network released the sensitive personal data of more than
fifty million users. According to the report provided by Facebook, hackers were able
to take access to the system by exploiting a vulnerability in the code that is used for
the ‘View as’ feature. Once this characteristic is discovered the attackers were able
to steal the access tokens which can be used to take over the account of the user
and gain access to other services. This breach is also affected by several kinds of
third party applications. These applications are connected with Facebook. It was
taken as a precautionary measure. The company logged on more than ninety million
users out of their accounts and perform reset to the accessibility of the tokens. This
security breach is the largest in the fourteen years history of this company. It saw
that the company tackles with the fallout from the Cambridge Analytical scandal and
the current claims that the platform is used in the Russian disinformation campaigns.
The Irish Data Protection Commission has performed an official enquiry into the
breach which could give in a penalty approximately $1.63 for this company.
8
http://citeseerx.ist.psu.edu/viewdoc/download?
doi=10.1.1.663.2951&rep=rep1&type=pdf
Parsons, K., McCormac, A., Pattinson, M.R., Butavicius, M.A. and Jerram, C., 2013.
An Analysis of Information Security Vulnerabilities at Three Australian Government
Organisations. In EISMC (pp. 34-44).
Summary:
An Analysis of Information Security Vulnerabilities at Three Australian Government
Organisations
In this article, the author describes the security breaches of an organization. This
report clearly describes this incident. This article is chosen because in this article this
type of thing is explained very carefully. In September 2018, Facebook disclosed that
an attack on its computer network released the sensitive personal data of more than
fifty million users. According to the report provided by Facebook, hackers were able
to take access to the system by exploiting a vulnerability in the code that is used for
the ‘View as’ feature. Once this characteristic is discovered the attackers were able
to steal the access tokens which can be used to take over the account of the user
and gain access to other services. This breach is also affected by several kinds of
third party applications. These applications are connected with Facebook. It was
taken as a precautionary measure. The company logged on more than ninety million
users out of their accounts and perform reset to the accessibility of the tokens. This
security breach is the largest in the fourteen years history of this company. It saw
that the company tackles with the fallout from the Cambridge Analytical scandal and
the current claims that the platform is used in the Russian disinformation campaigns.
The Irish Data Protection Commission has performed an official enquiry into the
breach which could give in a penalty approximately $1.63 for this company.
8
Week 7
The text briefly discusses aboute-commerce and e-business. Find and summarise
ONE resource that discusses the relationship between e-commerce and e-business.
The resource, and your summary, should describe similarities and difference
between e-commerce and e-business.
Title, Link and Reference:
Difference Between e-commerce and e-business
https://keydifferences.com/difference-between-e-commerce-and-e-business.html
S, S. (2019). Difference Between e-commerce and e-business (with Example and
Comparison Chart) - Key Differences. [online] Key Differences. Available at:
https://keydifferences.com/difference-between-e-commerce-and-e-business.html
[Accessed 26 Sep. 2019].
Summary:
Difference Between e-commerce and e-business
In this article, the author describes regarding e-commerce and e-business. The
article is selected because it provides enough knowledge regarding the similarity as
well as differences between e-commerce and e-business
Buying and selling of products by using the internet are known as e-commerce. In
the case of e-business, there must be the presence of electronics of a business. By
using this all the businesses are conducted by using the internet.
Similarities of e-commerce and e-business are both are operated with the help of the
internet. There are various numbers of differences between e-commerce and e-
business. E-commerce is a subset of e-business. E-business is the superset of e-
commerce. E-commerce is entirely restricted to the transactions of money but e-
business is not restricted to the transactions of money. E-commerce conducts
commercial transactions but e-business conducts the business transactions. The
approach of e-commerce is extroverted. The approach of E-business is Ambiverted.
In the case of e-commerce, the only requirement is a website. The requirements for
e-business are a website, CRM, ERP and many others. In the case of e-commerce,
the only internet is used. In the case of E-business internet, extranet and intranet are
used. Ecommerce cannot able to connect to the rest of the world but E-Business can
connect with the rest of the world.
Week 8
The text book discusses about the success story of ARI (Automotive Resources
International) company after implementing SAP BusinessObjects Explorerand
integrating it with HANA. HANA is SAP’s in-memory computing platform that is
deployable as an on-premise hardware and software appliance or in the cloud. Find
and summarise ONE resource that describes the success story of adapting SAP
HANA by another local or international company. The resource, and your summary,
should focus on the story aboutONE single company (which is not ARI company).
Title, Link and Reference:
SAP HANA & LEONARDO ECOSYSTEM PARTNERS 2019
https://isg-one.com/docs/default-source/default-document-library/
research_study_brochure_saphana-leonardo_ipl2019_eng.pdf?
sfvrsn=614ec231_0
Isg-one.com. (2019). [online] Available at:
https://isg-one.com/docs/default-source/default-document-library/research_study_bro
chure_saphana-leonardo_ipl2019_eng.pdf?sfvrsn=614ec231_0 [Accessed 26 Sep.
2019].
9
The text briefly discusses aboute-commerce and e-business. Find and summarise
ONE resource that discusses the relationship between e-commerce and e-business.
The resource, and your summary, should describe similarities and difference
between e-commerce and e-business.
Title, Link and Reference:
Difference Between e-commerce and e-business
https://keydifferences.com/difference-between-e-commerce-and-e-business.html
S, S. (2019). Difference Between e-commerce and e-business (with Example and
Comparison Chart) - Key Differences. [online] Key Differences. Available at:
https://keydifferences.com/difference-between-e-commerce-and-e-business.html
[Accessed 26 Sep. 2019].
Summary:
Difference Between e-commerce and e-business
In this article, the author describes regarding e-commerce and e-business. The
article is selected because it provides enough knowledge regarding the similarity as
well as differences between e-commerce and e-business
Buying and selling of products by using the internet are known as e-commerce. In
the case of e-business, there must be the presence of electronics of a business. By
using this all the businesses are conducted by using the internet.
Similarities of e-commerce and e-business are both are operated with the help of the
internet. There are various numbers of differences between e-commerce and e-
business. E-commerce is a subset of e-business. E-business is the superset of e-
commerce. E-commerce is entirely restricted to the transactions of money but e-
business is not restricted to the transactions of money. E-commerce conducts
commercial transactions but e-business conducts the business transactions. The
approach of e-commerce is extroverted. The approach of E-business is Ambiverted.
In the case of e-commerce, the only requirement is a website. The requirements for
e-business are a website, CRM, ERP and many others. In the case of e-commerce,
the only internet is used. In the case of E-business internet, extranet and intranet are
used. Ecommerce cannot able to connect to the rest of the world but E-Business can
connect with the rest of the world.
Week 8
The text book discusses about the success story of ARI (Automotive Resources
International) company after implementing SAP BusinessObjects Explorerand
integrating it with HANA. HANA is SAP’s in-memory computing platform that is
deployable as an on-premise hardware and software appliance or in the cloud. Find
and summarise ONE resource that describes the success story of adapting SAP
HANA by another local or international company. The resource, and your summary,
should focus on the story aboutONE single company (which is not ARI company).
Title, Link and Reference:
SAP HANA & LEONARDO ECOSYSTEM PARTNERS 2019
https://isg-one.com/docs/default-source/default-document-library/
research_study_brochure_saphana-leonardo_ipl2019_eng.pdf?
sfvrsn=614ec231_0
Isg-one.com. (2019). [online] Available at:
https://isg-one.com/docs/default-source/default-document-library/research_study_bro
chure_saphana-leonardo_ipl2019_eng.pdf?sfvrsn=614ec231_0 [Accessed 26 Sep.
2019].
9
Summary:
SAP HANA & LEONARDO ECOSYSTEM PARTNERS 2019
This paper describes the success story of the Information Services Group after
adopting SAP HANA. I choose this paper because it clearly describes the success
story of this company after adopting these services. This company provides the
services for the digital transformation with the help of the SAP Leonardo to develop
intelligent business functionalities by using the HANA databases. SAP Leonardo
provides the facility of Artificial Intelligence, machine learning, blockchain and
Internet of Things. This company packaged these as Platform-as-a-Service. It is
deployed on the HANA database. They are using the SAP Cloud Platform for the
purpose of development. It increases the efficiency of the development. This
company assess the transition of business, industry specific implementation, public
deployment and many others. This company provides different kinds of projects
include Artificial Intelligence, Machine Learning, Internet of Things and many others.
They are providing this by using SAP Leonardo. It is used as a standalone platform.
It also includes the design thinking in their services. They have the ability to provide
services to design, modify, implement the real-time analytics using the SAP HANA
platform. It is used to implement public, hybrid or on-premise cloud models. These
services can be assessed by the strategy of data management, process optimization
techniques and many others. These services have lots of advantages like
opmization, improvement of user experiences.
10
SAP HANA & LEONARDO ECOSYSTEM PARTNERS 2019
This paper describes the success story of the Information Services Group after
adopting SAP HANA. I choose this paper because it clearly describes the success
story of this company after adopting these services. This company provides the
services for the digital transformation with the help of the SAP Leonardo to develop
intelligent business functionalities by using the HANA databases. SAP Leonardo
provides the facility of Artificial Intelligence, machine learning, blockchain and
Internet of Things. This company packaged these as Platform-as-a-Service. It is
deployed on the HANA database. They are using the SAP Cloud Platform for the
purpose of development. It increases the efficiency of the development. This
company assess the transition of business, industry specific implementation, public
deployment and many others. This company provides different kinds of projects
include Artificial Intelligence, Machine Learning, Internet of Things and many others.
They are providing this by using SAP Leonardo. It is used as a standalone platform.
It also includes the design thinking in their services. They have the ability to provide
services to design, modify, implement the real-time analytics using the SAP HANA
platform. It is used to implement public, hybrid or on-premise cloud models. These
services can be assessed by the strategy of data management, process optimization
techniques and many others. These services have lots of advantages like
opmization, improvement of user experiences.
10
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Week 9
Rapid application development (RAD) is a process of creating a workable system in
a very short period of time. There are few recently developedframeworks available in
market to undertake RAD.Find and summarise ONErecent (within last two
years)resource that describesand recommends aboutONEframework for RAD.
Title, Link and Reference:
Charm: a framework for rapidly prototyping cryptosystems
http://www.cs.jhu.edu/~imiers/pdfs/charm.pdf
Akinyele, J.A., Garman, C., Miers, I., Pagano, M.W., Rushanan, M., Green, M. and Rubin,
A.D., 2013. Charm: a framework for rapidly prototyping cryptosystems. Journal of
Cryptographic Engineering, 3(2), pp.111-128.
Summary:
Charm: a framework for rapidly prototyping cryptosystems
In this article the author describes a framework of RAD named Charm. I choose this
article because this clearly describes the Charm framework of RAD. Brand new
developments in cryptography can greatly impact on the real-world systems.
Charm understands the afford mentioned targets at the architectural levels by using
various components as well as levels of modularization. The lower level components
are optimized for the efficiency. The main focus on the ease of the use and
interoperability. One of the priliminary drivers of this methodology is to simplify the
code written by the cryptographers. It has utilized the framework. Scheme
Automation and Adapters are responsible for different cryptosystems. It has the
implementations of different cryptosystems and it may be incompatible even if the
APIs are the same. For example, two systems might have separate input and output
requirements. It has to be consider that many public key encryption schemes
requires several plaintexts to be encoded early. The cyclic group of G is pre-
encoded. it may have the string of some fixed size. These requirements are totally
depends on the way in which the scheme is configured. It is totally depend on the
used parameters. various kinds of developers are not habituated to make all the
choices in their implementations. They want to construct their code using the
standard Application Programmable interface. Their systems are not able to
interoperate cleanly.
More subtle incompatibilities may arise when policies of a pre-defined class differ
guarantees to the security. Meta- Information is used to address this type of
problems. The charm must provide some methodology to identify the exact
information for every scheme. For example, public key encryption policies can
provide either IND-CPA or IND-CCA2 security. These properties become more
relevant when this kind of methodology is required.
Week 10
The failure to successfully implement large scale IS has led to the downfall of many
previously successful companies. Find and summarise ONE resource that describes
few reasons of implementation failure for large scale IS. The resource, and your
summary, should analyse at least three reasons of the failure.
Title, Link and Reference:
Proactive Drive Failure Prediction for Large Scale Storage Systems
http://storageconference.us/2013/Papers/2013.Paper.08.pdf
Zhu, B., Wang, G., Liu, X., Hu, D., Lin, S. and Ma, J., 2013, May. Proactive drive
failure prediction for large scale storage systems. In 2013 IEEE 29th Symposium on
Mass Storage Systems and Technologies (MSST) (pp. 1-5). IEEE.
11
Rapid application development (RAD) is a process of creating a workable system in
a very short period of time. There are few recently developedframeworks available in
market to undertake RAD.Find and summarise ONErecent (within last two
years)resource that describesand recommends aboutONEframework for RAD.
Title, Link and Reference:
Charm: a framework for rapidly prototyping cryptosystems
http://www.cs.jhu.edu/~imiers/pdfs/charm.pdf
Akinyele, J.A., Garman, C., Miers, I., Pagano, M.W., Rushanan, M., Green, M. and Rubin,
A.D., 2013. Charm: a framework for rapidly prototyping cryptosystems. Journal of
Cryptographic Engineering, 3(2), pp.111-128.
Summary:
Charm: a framework for rapidly prototyping cryptosystems
In this article the author describes a framework of RAD named Charm. I choose this
article because this clearly describes the Charm framework of RAD. Brand new
developments in cryptography can greatly impact on the real-world systems.
Charm understands the afford mentioned targets at the architectural levels by using
various components as well as levels of modularization. The lower level components
are optimized for the efficiency. The main focus on the ease of the use and
interoperability. One of the priliminary drivers of this methodology is to simplify the
code written by the cryptographers. It has utilized the framework. Scheme
Automation and Adapters are responsible for different cryptosystems. It has the
implementations of different cryptosystems and it may be incompatible even if the
APIs are the same. For example, two systems might have separate input and output
requirements. It has to be consider that many public key encryption schemes
requires several plaintexts to be encoded early. The cyclic group of G is pre-
encoded. it may have the string of some fixed size. These requirements are totally
depends on the way in which the scheme is configured. It is totally depend on the
used parameters. various kinds of developers are not habituated to make all the
choices in their implementations. They want to construct their code using the
standard Application Programmable interface. Their systems are not able to
interoperate cleanly.
More subtle incompatibilities may arise when policies of a pre-defined class differ
guarantees to the security. Meta- Information is used to address this type of
problems. The charm must provide some methodology to identify the exact
information for every scheme. For example, public key encryption policies can
provide either IND-CPA or IND-CCA2 security. These properties become more
relevant when this kind of methodology is required.
Week 10
The failure to successfully implement large scale IS has led to the downfall of many
previously successful companies. Find and summarise ONE resource that describes
few reasons of implementation failure for large scale IS. The resource, and your
summary, should analyse at least three reasons of the failure.
Title, Link and Reference:
Proactive Drive Failure Prediction for Large Scale Storage Systems
http://storageconference.us/2013/Papers/2013.Paper.08.pdf
Zhu, B., Wang, G., Liu, X., Hu, D., Lin, S. and Ma, J., 2013, May. Proactive drive
failure prediction for large scale storage systems. In 2013 IEEE 29th Symposium on
Mass Storage Systems and Technologies (MSST) (pp. 1-5). IEEE.
11
Summary:
Proactive Drive Failure Prediction for Large Scale Storage Systems
This article describes clearly regarding the failures of the IS systems. I choose this
article because this article describes the failures of the IS systems. The main reason
behind this is not to establish the measurable targets. If the project manager is not
able to set the target properly then it will cause the failure of the IS system.
Sometimes it may happen that the employees are not able to define the
requirements of the project. The IS systems may fail because of GAP/FIT analysis of
the IS systems. GAP/FIT indicates that a product is the good choice for the
requirements of the project. They used the Wilcoxon rank-sum test to build prediction
details. They are using two different kinds of strategies. One is multiple vibrate test
and another one is ORing single attribute test. These are tested on 3744 drives. The
highest detection rate achievable was 60% with 0.5% FAR. It can also be performed
by using SVM. Their SVM model uses SMART attributes and they are also using the
change rates. Sample data sets from different windows are used to train various
models. Each of the SMART attribute uses a raw value and a normalized value. The
format of the RAW_VALUE is the vendor specific.
12
Proactive Drive Failure Prediction for Large Scale Storage Systems
This article describes clearly regarding the failures of the IS systems. I choose this
article because this article describes the failures of the IS systems. The main reason
behind this is not to establish the measurable targets. If the project manager is not
able to set the target properly then it will cause the failure of the IS system.
Sometimes it may happen that the employees are not able to define the
requirements of the project. The IS systems may fail because of GAP/FIT analysis of
the IS systems. GAP/FIT indicates that a product is the good choice for the
requirements of the project. They used the Wilcoxon rank-sum test to build prediction
details. They are using two different kinds of strategies. One is multiple vibrate test
and another one is ORing single attribute test. These are tested on 3744 drives. The
highest detection rate achievable was 60% with 0.5% FAR. It can also be performed
by using SVM. Their SVM model uses SMART attributes and they are also using the
change rates. Sample data sets from different windows are used to train various
models. Each of the SMART attribute uses a raw value and a normalized value. The
format of the RAW_VALUE is the vendor specific.
12
MARKING SHEET - DO NOT DELETE
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the
task; summary fails to explain what the resource was about; the relevance
and/or usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent,but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot
be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content/contains content not contained in the resource) OR
Multiple resources used for a single task
Resource is generic AND/OR covers multiple technologies/examples
rather than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
13
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the
task; summary fails to explain what the resource was about; the relevance
and/or usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent,but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot
be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content/contains content not contained in the resource) OR
Multiple resources used for a single task
Resource is generic AND/OR covers multiple technologies/examples
rather than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
13
1 out of 13
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.