COIT20246 ICT Services Management - Supplementary Assignment T2 2017

Verified

Added on  2020/04/13

|16
|4807
|131
Homework Assignment
AI Summary
This document presents a comprehensive solution to the COIT20246 ICT Services Management supplementary assignment from T2, 2017. The assignment comprises ten tasks, each requiring a summary of a relevant resource. Task 1 focuses on HDD technology, summarizing significant changes over the last ten years. Task 2 explores mobile operating systems beyond iOS, Android, and Windows Mobile, highlighting BlackBerry 10. Task 3 examines developments in WiFi and other short-range wireless technologies. Task 4 delves into application layer protocols, specifically SMTP, and its features. Task 5 analyzes a recent cyber-attack, focusing on the WannaCry ransomware. The solution provides detailed summaries of each resource, including the titles, references, and key findings, addressing various aspects of ICT services management.
Document Page
COIT20246 ICT Services Management -T2, 2017 Supplementary Assignment
COIT 20246 ASSIGNMENT SUBMISSION

Due date:
Friday 1 Dec 2017 (2PM AEST)
Part:
Written Assessment
Weighting:
30% of total assessment.
Submission:
Electronic (see course website for details)
Instructions

It will be necessary to use literature/online resources to complete this

assignment, please ensure you cite and reference any such materials using

the Harvard format as indicated in this unit.

Important
: You are responsible to read and apply all the requirements for this
assignment found on the unit page on Moodle. Check the unit website for all

the other supplementary assignment task requirements, and on resources

that can/cannot be used.

DO NOT
copy content directly from either the text or Internet resources: this
assignment is to be in
your own words. You will lose marks if you do not use
your own words! Do not use answers from your past assignments as this can

be considered as
self-plagiarism, and serious penalties will apply.
Please complete your assignment using
this submission template file,
inserting your responses by replacing the place holders
only where indicated
by < >. Fill in your name and student ID where indicated. Do not modify other

parts of this template; penalties apply.

DO NOT delete the marking criteria page
– changes are not permitted to
the formatting of other pages including the headers and footers.

Please fill in the following details:

Student Name

Student Number

Supplementary Assessment Term2, 2017 Page: 1 / 16
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
COIT20246 ICT Services Management -T2, 2017 Supplementary Assignment
Tasks

There are ten (10) tasks, one question for each task: the tasks are detailed below.

There is a table to complete for each task. Please fill in the information required.

Note: Each resource summary should be around 200-300 words.

Task 1

The text discusses the elements of modern computing architecture and its various

components. Over the years, advances in technology had impacted its development and

greatly improved its performance. The hard disk drive (HDD) is one such component that had

experienced technological advances. Find and summarise
ONE resource that describes
significant changes in HDD technology that occurred in the last ten years.

Title and Reference:

Hard Disk Drive

Hiratsuka, D., 2016. Production networks in Asia: A case study from the hard disk

drive industry. In
Production Networks and Enterprises in East Asia (pp. 139-157).
Springer Japan.

Igami, M., 2015. Estimating the Innovator's Dilemma: Structural Analysis of Creative

Destruction in the Hard Disk Drive Industry, 1981-1998.

URL:
http://benignblog.com/2014/01/evolution-of-hard-drive-technology-and-
progress-in-its-industry.html

Summary:

The following source is about the evolution of hard disk drive technology in an

organization. The sour
ce has been selected because it provides detail information
about the evolution of hard disk that is from 1956 to present day. Journey of hard disk

technology began with its invention in IBM in the year of 1956 (Hiratsuka, 2016).

After passing through different stages of development the technology has reached its

highest usable form. Reynold B. Johnson is considered to be inventor and father of

hard disk drive.

In the last few years thin extremely thin and large capacity hard disk drives were

manufactured. In the last few years’ hard disk has claimed to provide terabyte space

for storage of data. Serial ATA (SATA) which claim to provide 3Gbps of data in the

year of 2005. Serial ATA technology was evolved over the period of time.

Supplementary Assessment Term2, 2017 Page: 2 / 16
Document Page
COIT20246 ICT Services Management -T2, 2017 Supplementary Assignment
Various core technologies like Perpendicular Magnetic recording, Tunnel

Magneto Resistive Read Sensor (TMR), Hybrid of solid state drive and hard disk

drive and many other technologies have changed the manufacturing business. In last

few years the taste and choice of consumers have changed a lot where consumer can

easily get several terabyte of space at a very low price (Igami, 2015). At present the

hard disk are very small in size and the weight is even less than few hundred grams.

This has been possible due to research work and it has open door to various new

platform like cloud storage, data centre which are digital in nature, sharing of

services.

The above resource was useful as it has provided us a large number of

information related to hard drive. The resource has detail information about

manufacturing of hard disk right from its discovery.

Task 2

The text discusses the components and activities of operating systems. Over the last decade,

there was an increase of mobile devices in the market. The Apple iOS, Google Android, and

Microsoft Windows Mobile may be the most familiar operating systems found in many mobile

devices. However, there are other mobile devices that do not use these OS. Find and

summarise a resource that describes
ONE other mobile OS that is not listed above. The
selected mobile OS should be currently in use in mobile devices.

Title and Reference:

BlackBerry 10

Goasduff, L. and Pettey, C., 2012. Gartner says worldwide smartphone sales soared in

fourth quarter of 2011 with 47 percent growth.
Visited April.
Rahulamathavan, Y., Moonsamy, V., Batten, L., Shunliang, S. and Rajarajan, M.,

2014, July. An analysis of tracking settings in Blackberry 10 and Windows Phone 8

Smartphones. In
Australasian Conference on Information Security and Privacy (pp.
430-437). Springer, Cham.

URL
: https://global.blackberry.com/en/software/smartphones/blackberry-10-os.
Summary:

Blackberry 10 is well known mobile operating system which was mainly

Supplementary Assessment Term2, 2017 Page: 3 / 16
Document Page
COIT20246 ICT Services Management -T2, 2017 Supplementary Assignment
developed by blackberry limited. The resource is all about Blackberry 10 and all the

details has been provided in details. This particular operating system works on the

QNX which is a well-known operating system. The resource has been selected as it

provides detail information about well-known operating system that is Blackberry 10.

Blackberry 10 supports application framework which provide runtime for

running various Android application. This particular operating system supports some

framework of Qt and some features of Android runtime for running or performing

various android application (Goasduff and Pettey, 2012). Blackberry is considered to

be a well-known application for maintaining privacy and security in their various

smartphones. With the development of latest version of Blackberry and anti-theft

protection this particular version allows the user to completely disallow the device in

the case when the device is lost or stolen. This particular version of blackberry

provides a platform by which device cannot be reactivated or easily accessed by

anyone else. By making use of blackberry blend the productivity across various

device is easily maintained. It also provides a fresh, new design look which are

completely based on the feedback of customer.

Blackberry version of provides great business and productivity of application

by making of use of Android games and application which is generally available at

app store (Rahulamathavan et al., 2014). Latest version of blackberry that is 10.3

provides allow various manager to have proper management of various things like

email, contacts and calendar. It generally helps in the execution of various task like

emails, proper arrangement of emails.

The resource is useful as provide various information as it provides various

upgraded features to its user. It has provided us with some of important features like

antitheft technology so that device cannot have reactivated easily by anyone else.

Supplementary Assessment Term2, 2017 Page: 4 / 16
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
COIT20246 ICT Services Management -T2, 2017 Supplementary Assignment
Task 3

Data networks had traditionally relied on copper cables for its connectivity. However, short-

range wireless connectivity to networks using WiFi increased in use because of the

proliferation of mobile devices. Find and summarise
ONE resource that describes
developments (in the last 5 years) with focus on
either WiFi or other shorter-range wireless
network connection technology.

Title and Reference:

WI-FI

Duarte, M., Sabharwal, A., Aggarwal, V., Jana, R., Ramakrishnan, K.K., Rice, C.W.

and Shankaranarayanan, N.K., 2014. Design and characterization of a full-duplex

multiantenna system for WiFi networks.
IEEE Transactions on Vehicular
Technology
, 63(3), pp.1160-1177.
Lee, K., Lee, J., Yi, Y., Rhee, I. and Chong, S., 2013. Mobile data offloading: How

much can WiFi deliver?
IEEE/ACM Transactions on Networking (TON), 21(2),
pp.536-550.

URL:
https://www.wired.com/2003/05/wifirevolution/
Summary:

This resource is all about evolution of WI-FI in the last five years. The

resource has clearly stated the importance and use of WI-FI like it provides unwiring

of living room, making of Wi-Fi for crossing the last mile and lastly converging with

cell phone (Duarte et al., 2014). The resource has provided all the detail information

regarding three standard that it 802.11b, 802.11a, 802.11g has been discussed in

details.

This particular resources have been selected because it contains detail

information of three standards of WI-FI that is 802.11b, 802.11a, 802.11g and various

advantages of WI-FI technology has been discussed in details.

Previously digital media has grown in large from MP3 to DVD and this

technology has almost taken various electronic equipment’s. On the contrary latest

electronic maker were unable to come up with a common standard. WI-FI has been

able to overcome the issue and has become the most common solution for linking

various together like music, video and phones with very less amount of effort. The

Supplementary Assessment Term2, 2017 Page: 5 / 16
Document Page
COIT20246 ICT Services Management -T2, 2017 Supplementary Assignment
ultimate goal of central server will be back off is to minimize various records, store

music (Lee et al., 2013). As soon as the living network is wireless network the very

big era of internet will arrive which upgrade the broadband services.

The resource has been useful as it provides advantages of WI-FI and its

evolution in last 5 years. The following advantages like unwiring of living room,

coverage provided by WI-FI. The details of 802.11b has been provided which is

considered as the basic standard.

Task 4

Protocols are important in network communications. They can provide reliability and efficiency

in a communication link. One application layer (L5) protocol discussed was HTTP. Find and

summarise a resource that describes the features and uses of
ONE other common
application layer (L5) protocol that is not discussed in the text (i.e.
NOT HTTP).
Title and Reference:

SMTP (Simple mail transfer protocol)

URL:
http://www.geeksforgeeks.org/simple-mail-transfer-protocol-smtp/
Costa, C. and Oliveira, J.L., 2012. Telecardiology through ubiquitous Internet

services.
International journal of medical informatics, 81(9), pp.612-621.
Stringhini, G., Egele, M., Zarras, A., Holz, T., Kruegel, C. and Vigna, G., 2012,

August. B@ bel: Leveraging Email Delivery for Spam Mitigation. In
USENIX
Security Symposium
(pp. 16-32).
Summary:

The following source is about simple mail transfer protocol (SMTP). Emails

are considered to be one of the most valuable service (Stringhini et al., 2012). Most of

the internet based system make use of SMTP as method or technique used for

transferring mail from one user to next other.

The following resource provides information about the SMTP fundamental,

Supplementary Assessment Term2, 2017 Page: 6 / 16
Document Page
COIT20246 ICT Services Management -T2, 2017 Supplementary Assignment
protocol of SMTP, various details related to sending and receiving of email has been

provided by resource.

SMTP is type of application layer protocol in which the client or user opens

up a TCP connection of the server of SMTP and after that it provides a proper mail

for establishment of connection. SMTP is always considered to be listening mode on

the contrary as soon it has orders for TCP connection from the any client it initiates a

process on the port. After that a successful TCP connection process is initiated and the

mail is send instantly (Costa and Oliveira, 2012). Two type of SMTP model has been

discussed which are end to end user and store to forward user. The communication

between server and receiver has been established by making use of MTA. The

ultimate goal of MTA is to transfer the various mail across the network to MTA

present at the receiver.

The resource was useful as it provided some of vital information regarding

the fundamentals of SMTP, Protocol based on SMTP, importance of MTA for

establishment of communication has been discussed above.

Task 5

Cyber-attacks on private or government ICT assets have become more disruptive as reported

by the media. Find and summarise a resource that describes
ONE recent cyber-attack
(within the last 3 years) against a private or public
infrastructure. (Note: an attack on an
individual account or a web-site is not valid for this task.).

Title and Reference:

Wannacry ransomware

URL:
https://www.theguardian.com/technology/2017/may/12/nhs-ransomware-cyber-
attack-what-is-wanacrypt0r-20

Martin, G., Kinross, J. and Hankin, C., 2017. Effective cybersecurity is fundamental

to patient safety.

Mohurle, S. and Patil, M., 2017. A brief study of wannacry threat: Ransomware attack

2017.
International Journal, 8(5).
Supplementary Assessment Term2, 2017 Page: 7 / 16
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
COIT20246 ICT Services Management -T2, 2017 Supplementary Assignment
Summary:

The source is about malicious software WannaCry which hit the Britain

National Health Service and some of the largest organization which are present in the

countries like Russia, Ukraine and Taiwan.

The source has been selected because it provided detail information regarding

the WannaCry ransomware which claim to hit several organization of the world.

Ransomware is type of malware which blocks the access to important data containing

information and in return it demands money to release it (Martin, Kinross and Hankin,

2017). This particular source has been selected as it contains the detail information

regarding the spreading mechanism of this attack.

WannaCry Ransomware is a malware which affected many organizations.

Before the release of files Microsoft release an affected version of which cannot be

used to spread malware. On the contrary due to the lack of resources latest updates

were not made possible, organization are more focusing to install such security on a

global scale (Mohurle and Patil, 2017). The attack lasted for short interval of time.

After the payment received by hackers through bitcoin. The reason behind the

targeting of NHS has been discussed it details in this source.

The resource was useful as provided details information regarding the

wannaCry ransomware attack. Working principle regarding this WannaCry

Ransomware attack has discussed in detail. Spreading mechanism of this attack has

been discussed in details.

Task 6

Society is increasingly reliant on networks and network technologies. Failure in ICT services

can hamper and seriously disrupt business operations. Find and summarise a resource that

Supplementary Assessment Term2, 2017 Page: 8 / 16
Document Page
COIT20246 ICT Services Management -T2, 2017 Supplementary Assignment
describes
ONE example of one such recent failure (within the last 3 years) in the
transportation industry that had serious impact on commerce. You should not use any

examples covered in the textbook.

Title and Reference:

Failure of ICT in transport industry

URL:
https://www.lexology.com/library/detail.aspx?g=cca9ae3a-2fa7-4550-9445-
39bc32a4c3ff

Palmer, D. and Warren, I., 2013. Zonal banning and public order in urban

Australia.
Policing cities: Urban securitisation and regulation in a 21st century
world
, pp.79-96.
Victoria, A.T. and Davey, B., 2013. Major eGovernment projects in health, education

and transport in Victoria.

Summary:

Complex ICT projects generally consists of high degree of risk which

consist of high degree of risk and sustainable cost and claims to deliver benefits.

Various cases have been provided regarding the failure of ICT in transport industry.

The source has been selected because it provides detail information

regarding various failure cases of implementation of ICT in various domains.

Victorian Transport Ticketing Authority has been selected for this report (Palmer and

Warren, 2013). Victorian Transport Ticketing Authority is currently replacing the

present ticketing system with a new a card technology known as smartcard

technology.

In this new technology passenger can easily touch on and off for all the

trams and buses throughout grid of transport which is available in metropolitan city.

From the initial stage the project suffered a large number of issue as the member of

TTA does not have detail skill and information regarding the transport ticketing

environment (Victoria and Davey, 2013). The project suffered a lot of negotiation

regarding which is inclusive of various documentation. The contract of lacked some

specificity and which result in creation of misunderstanding about the various

available documents.

Supplementary Assessment Term2, 2017 Page: 9 / 16
Document Page
COIT20246 ICT Services Management -T2, 2017 Supplementary Assignment
The resource was useful as it provides detail information regarding complexity

of various ICT projects. The issue of Victorian Transport Ticketing Authority has

been selected for this project.

Task 7

Ecommerce had an overwhelming impact on traditional retail businesses. Many businesses

that had adopted this and have become successful in the sale and delivery of their products.

Find and summarise a resource that describes the history of
ONE such traditional business
that became and remain successful because of this. You should not use any examples

covered in the textbook.

Title and Reference:

MH Industry

URL:
http://www.selfgrowth.com/articles/the-impact-of-e-commerce-on-the-traditional-
companies

Katawetawaraks, C. and Cheng, L.W., 2013. Online shopper behavior: Influences of

online shopping decision.

Zhou, L., Zhang, P. and Zimmermann, H.D., 2013. Social commerce research: An

integrated view.
Electronic commerce research and applications, 12(2), pp.61-68.
Summary:

E-commerce is something new to the traditional retail business. Ecommerce

is an online commerce which generally consist of retail shopping, banking, stocks and

bonds. With the development of ecommerce various traditional business has been

affected. Various organization round the globe has been affected due to the help of

ecommerce. Ecommerce is quietly different traditional business.

The following resource has been selected as it provides detail information

regarding the organization (Katawetawaraks, and Cheng, 2013). It has provided the

list of benefits which the ecommerce industry can get easily. Ecommerce provided a

lot of benefit to this organization that is MH industry Co. It provided the advantages

like saving of labour cost, build-up which is given to ecommerce and it will increase

the sales channel. E-commerce is different from traditional business. Ecommerce

Supplementary Assessment Term2, 2017 Page: 10 / 16
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
COIT20246 ICT Services Management -T2, 2017 Supplementary Assignment
industry aims in providing proper channel for distribution (Zhou, Zhang and

Zimmermann, 2013). Ecommerce create a channel for distribution for the existing

production this organization that is MH Industry. This has ultimately helped the

organization in establishing a successful platform for the organization.

The resource was useful as it provides all the detail information regarding the

M H industry and how it became successful. It provides the information regarding the

benefits of using the ecommerce like online payment and tradition will attract a lot of

customers. Ecommerce industry can be helpful increasing the selling of product by

making the whole world as a platform for selling of goods.

Task 8

With the advent of mass data collection and storage by many large commercial companies

and government agencies, there is a growing sense of the increase risk for abuse by these

organisations.
Find and summarise a resource that describes ONE example where massive
data collection
had been misused or abused by a commercial business or a government
agency. You should not use any examples covered in the textbook.

Title and Reference:

Misuse of Data Collection

URL:
https://www.observeit.com/blog/importance-data-misuse-prevention-and-detection/
Beresford, A.R., Kübler, D. and Preibusch, S., 2012. Unwillingness to pay for

privacy: A field experiment.
Economics Letters, 117(1), pp.25-27.
Zyskind, G. and Nathan, O., 2015, May. Decentralizing privacy: Using blockchain to

protect personal data. In
Security and Privacy Workshops (SPW), 2015 IEEE (pp.
180-184). IEEE.

Summary:

The following source is about misuse of data in various well known

organization of data. The source provides detail information regarding the various

cases of misuse of data. The following source reveals the detail information about the

misuse of data. The sensitive data after being stolen is sold to various third parties

who can find various methods to misuse the given data.

The following source has been selected because it provides detail information

Supplementary Assessment Term2, 2017 Page: 11 / 16
Document Page
COIT20246 ICT Services Management -T2, 2017 Supplementary Assignment
regarding various organization like Uber (Beresford, Kübler, and Preibusch, 2012).

Various cases of misuse of data that is 88 police man found the misuse of personal

data, Florida supreme court cases has been discussed in details.

Misuse of data like theft can led to things like theft which can be easily

achieved through various flaws and mistakes. Sensitive data which is collected

through various flaws and mistake is later sold to third parties by which various

agencies can easily find various ways to make misuse of data. This source provides us

with details about the organization like Uber where an employee violated the rules by

making use of God View Tool for tracking a journalist who was late for interview

(Zyskind and Nathan, 2015). This god view application allows employees to track

both Uber vehicles and the customers. This particular action violated the rules and

regulation of personal data.

The resource was useful as it provided detail information various cases of misuse

of personal data. This following source has provided us with detail information

regarding the various cases of misuse of data.

Task 9

The failure to adapt business processes and embrace technology, particularly ICT, has led to

the downfall of many previously successful companies. Find and summarise a resource that

describes
ONE example of an organisation that failed to adapt to changes in technology and
explain what the organisation failed to do/respond to. (Note: this task is
not about specific
product failure – read the question carefully.)

Title and Reference:

KODAK

King, A.A. and Baatartogtokh, B., 2015. How useful is the theory of disruptive

innovation?.
MIT Sloan Management Review, 57(1), p.77.
Moliterno, J.E., 2012. The Trouble with Lawyer Regulation.
Emory LJ, 62, p.885.
URL:
https://www.insidermonkey.com/blog/10-companies-that-failed-to-innovate-and-change-
572511/2/

Supplementary Assessment Term2, 2017 Page: 12 / 16
chevron_up_icon
1 out of 16
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]