Ask a question from expert

Ask now

Cyber Attacks Against Critical Infrastructure Report

6 Pages2130 Words186 Views
   

Added on  2020-07-23

Cyber Attacks Against Critical Infrastructure Report

   Added on 2020-07-23

BookmarkShareRelated Documents
InstructionsIt will be necessary to use literature/online resources to complete this assignment, please ensure you cite and reference any such materials using the Harvard format. DO NOT copy content directly from either the text or Internet resources: this assignment is to be in your own words. You will lose marks if you do not use your own words!Please complete your assignment using this submission template file, inserting your responses where indicated.DO NOT delete the marking criteria page – changes are permitted to the formatting of other pages including the headers and footers.Please fill in the following details:Student NameStudent NumberQuestion 1Tasks
Cyber Attacks Against Critical Infrastructure Report_1
Week 1The text discusses the elements of modern computing architecture however is largely silent onthe individuals who played a role in its development. Find and summarise a resource that describes ONE such individual. The individual should have had a significant influence on the development of computers and/or components of modern computing architecture.Title and Reference:Computer Architecture todaySilberstein, M., 2017. Computer Architecture today. [Online] Available Through:<https://www.sigarch.org/blog/>. [Accessed on 18th September 2017].Summary:From the taken blog, the efficiency of the operating systems (Oses) has been in thespotlight of system researchers in early 60s. The OS is commonly seemed as a layerbetween applications and hardware, this seems to mislead the application in CPU:application code runs on the CPU without any OS mediation. The execution from theapplication to the OS goes through two protection domains, it incurs the world switchwith its associated overhead. The numerous layers of the OS design are essential tobreak its complexity. Crossing these layers might get expensive as they consumerequire more data. OS is unaware of application logic and run time state, thus it offersonly general mechanism and policies that are not well suited for the specificapplication. The libOSes provides an attractive and less costing alternative totraditional OSes, particularly in high performance servers, but they pose newrequirements and provide an opportunity to revisit the existing architectural supportfor OSes in order to make libOSes more robust, usable and efficient. The libOSeswhich is new generation single application which caused overwhelming changes in thehardware and the software landscape in the publications. This application gives thehigh performance servers which helps in which implements exokernel designprinciples on modern hardware with virtualization support. The adoption of thelibOSes is driven by the necessity of achieving maximum efficiency and becomespractical in hardware virtualization which supports in both CPU and I/O devices. Insummary, the application of hardware and software is discussed with the newapplication to make the work easier and faster.Week 2The text discusses the components and activities of operating systems however is largely silent on the individuals who played a role in their development. Find and summarise a resource that describes ONE such individual. The individual should have had a significant
Cyber Attacks Against Critical Infrastructure Report_2
influence on the writing or development of operating systems.Title and Reference:Ajaz Ahmed 2012. An operating system for life . [Online] Available Through: <https://www.theguardian.com/media-network/media-network-blog/2012/nov/02/operating-system-for-life>. [Accessed on 18th September 2017].From the taken blog, the role of an individual in operating system for life looks littlecool for the start ups due to the innovation obsessed economy. The new way to changethe technology is to work with smartness with the culture. The technology is changingwith the culture with new and smart software that comes out of nowhere to show thebetter way of doing things. When the people will watch the evolution of popular digitalculture – and observe which will serve them love and are loyal to, which they getinfatuated and then bored with, which they ignore, which they actively resent – to getthe expected positive results. The organizing of set with the programs with theresources and activities. The era of services accessed through mobile phones hasshown us that people really respond to the tools configured around to solve theproblem related to the application. The people like to do there work quickly and fasterto manage this the resources and the activities need to be managed. The part oftechnology that is developed to use the sensors and cameras to understand the spatialterrain around the car and respond accordingly, so drivers can't mistakenly move intotoo-small spaces, bump into unseen objects, and won't have to correct driving lines.The second key innovation is the replacement of all the mechanical componentsbetween steering wheel and front wheels with electronics, for a much quicker, moreresponsive, and driver-aware experience.
Cyber Attacks Against Critical Infrastructure Report_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
COIT 20246 Assignment Submission
|13
|3929
|457

COIT 20246 Assignment Submission
|12
|3986
|357

Sample Assignment on Electronic PDF
|9
|3696
|108

Von Neumann Architecture : Assignment
|6
|2231
|33

COIT 20246 Assignment Submission
|9
|3329
|56

Desklib: Online Library for Study Material with Solved Assignments, Essays, Dissertations
|14
|4603
|435