COIT20246 ICT Services Management - Supplementary Assignment T2 2017
VerifiedAdded on 2020/04/13
|16
|4807
|131
Homework Assignment
AI Summary
This document presents a comprehensive solution to the COIT20246 ICT Services Management supplementary assignment from T2, 2017. The assignment comprises ten tasks, each requiring a summary of a relevant resource. Task 1 focuses on HDD technology, summarizing significant changes over the last ten years. Task 2 explores mobile operating systems beyond iOS, Android, and Windows Mobile, highlighting BlackBerry 10. Task 3 examines developments in WiFi and other short-range wireless technologies. Task 4 delves into application layer protocols, specifically SMTP, and its features. Task 5 analyzes a recent cyber-attack, focusing on the WannaCry ransomware. The solution provides detailed summaries of each resource, including the titles, references, and key findings, addressing various aspects of ICT services management.

COIT20246 ICT Services Management -T2, 2017 Supplementary Assignment
COIT 20246 ASSIGNMENT SUBMISSION
Due date: Friday 1 Dec 2017 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Instructions
It will be necessary to use literature/online resources to complete this
assignment, please ensure you cite and reference any such materials using
the Harvard format as indicated in this unit.
Important: You are responsible to read and apply all the requirements for this
assignment found on the unit page on Moodle. Check the unit website for all
the other supplementary assignment task requirements, and on resources
that can/cannot be used.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use
your own words! Do not use answers from your past assignments as this can
be considered as self-plagiarism, and serious penalties will apply.
Please complete your assignment using this submission template file,
inserting your responses by replacing the place holders only where indicated
by < >. Fill in your name and student ID where indicated. Do not modify other
parts of this template; penalties apply.
DO NOT delete the marking criteria page – changes are not permitted to
the formatting of other pages including the headers and footers.
Please fill in the following details:
Student Name
Student Number
Supplementary Assessment Term2, 2017 Page: 1 / 16
COIT 20246 ASSIGNMENT SUBMISSION
Due date: Friday 1 Dec 2017 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Instructions
It will be necessary to use literature/online resources to complete this
assignment, please ensure you cite and reference any such materials using
the Harvard format as indicated in this unit.
Important: You are responsible to read and apply all the requirements for this
assignment found on the unit page on Moodle. Check the unit website for all
the other supplementary assignment task requirements, and on resources
that can/cannot be used.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use
your own words! Do not use answers from your past assignments as this can
be considered as self-plagiarism, and serious penalties will apply.
Please complete your assignment using this submission template file,
inserting your responses by replacing the place holders only where indicated
by < >. Fill in your name and student ID where indicated. Do not modify other
parts of this template; penalties apply.
DO NOT delete the marking criteria page – changes are not permitted to
the formatting of other pages including the headers and footers.
Please fill in the following details:
Student Name
Student Number
Supplementary Assessment Term2, 2017 Page: 1 / 16
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

COIT20246 ICT Services Management -T2, 2017 Supplementary Assignment
Tasks
There are ten (10) tasks, one question for each task: the tasks are detailed below.
There is a table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Task 1
The text discusses the elements of modern computing architecture and its various
components. Over the years, advances in technology had impacted its development and
greatly improved its performance. The hard disk drive (HDD) is one such component that had
experienced technological advances. Find and summarise ONE resource that describes
significant changes in HDD technology that occurred in the last ten years.
Title and Reference:
Hard Disk Drive
Hiratsuka, D., 2016. Production networks in Asia: A case study from the hard disk
drive industry. In Production Networks and Enterprises in East Asia (pp. 139-157).
Springer Japan.
Igami, M., 2015. Estimating the Innovator's Dilemma: Structural Analysis of Creative
Destruction in the Hard Disk Drive Industry, 1981-1998.
URL: http://benignblog.com/2014/01/evolution-of-hard-drive-technology-and-
progress-in-its-industry.html
Summary:
The following source is about the evolution of hard disk drive technology in an
organization. The source has been selected because it provides detail information
about the evolution of hard disk that is from 1956 to present day. Journey of hard disk
technology began with its invention in IBM in the year of 1956 (Hiratsuka, 2016).
After passing through different stages of development the technology has reached its
highest usable form. Reynold B. Johnson is considered to be inventor and father of
hard disk drive.
In the last few years thin extremely thin and large capacity hard disk drives were
manufactured. In the last few years’ hard disk has claimed to provide terabyte space
for storage of data. Serial ATA (SATA) which claim to provide 3Gbps of data in the
year of 2005. Serial ATA technology was evolved over the period of time.
Supplementary Assessment Term2, 2017 Page: 2 / 16
Tasks
There are ten (10) tasks, one question for each task: the tasks are detailed below.
There is a table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Task 1
The text discusses the elements of modern computing architecture and its various
components. Over the years, advances in technology had impacted its development and
greatly improved its performance. The hard disk drive (HDD) is one such component that had
experienced technological advances. Find and summarise ONE resource that describes
significant changes in HDD technology that occurred in the last ten years.
Title and Reference:
Hard Disk Drive
Hiratsuka, D., 2016. Production networks in Asia: A case study from the hard disk
drive industry. In Production Networks and Enterprises in East Asia (pp. 139-157).
Springer Japan.
Igami, M., 2015. Estimating the Innovator's Dilemma: Structural Analysis of Creative
Destruction in the Hard Disk Drive Industry, 1981-1998.
URL: http://benignblog.com/2014/01/evolution-of-hard-drive-technology-and-
progress-in-its-industry.html
Summary:
The following source is about the evolution of hard disk drive technology in an
organization. The source has been selected because it provides detail information
about the evolution of hard disk that is from 1956 to present day. Journey of hard disk
technology began with its invention in IBM in the year of 1956 (Hiratsuka, 2016).
After passing through different stages of development the technology has reached its
highest usable form. Reynold B. Johnson is considered to be inventor and father of
hard disk drive.
In the last few years thin extremely thin and large capacity hard disk drives were
manufactured. In the last few years’ hard disk has claimed to provide terabyte space
for storage of data. Serial ATA (SATA) which claim to provide 3Gbps of data in the
year of 2005. Serial ATA technology was evolved over the period of time.
Supplementary Assessment Term2, 2017 Page: 2 / 16

COIT20246 ICT Services Management -T2, 2017 Supplementary Assignment
Various core technologies like Perpendicular Magnetic recording, Tunnel
Magneto Resistive Read Sensor (TMR), Hybrid of solid state drive and hard disk
drive and many other technologies have changed the manufacturing business. In last
few years the taste and choice of consumers have changed a lot where consumer can
easily get several terabyte of space at a very low price (Igami, 2015). At present the
hard disk are very small in size and the weight is even less than few hundred grams.
This has been possible due to research work and it has open door to various new
platform like cloud storage, data centre which are digital in nature, sharing of
services.
The above resource was useful as it has provided us a large number of
information related to hard drive. The resource has detail information about
manufacturing of hard disk right from its discovery.
Task 2
The text discusses the components and activities of operating systems. Over the last decade,
there was an increase of mobile devices in the market. The Apple iOS, Google Android, and
Microsoft Windows Mobile may be the most familiar operating systems found in many mobile
devices. However, there are other mobile devices that do not use these OS. Find and
summarise a resource that describes ONE other mobile OS that is not listed above. The
selected mobile OS should be currently in use in mobile devices.
Title and Reference:
BlackBerry 10
Goasduff, L. and Pettey, C., 2012. Gartner says worldwide smartphone sales soared in
fourth quarter of 2011 with 47 percent growth. Visited April.
Rahulamathavan, Y., Moonsamy, V., Batten, L., Shunliang, S. and Rajarajan, M.,
2014, July. An analysis of tracking settings in Blackberry 10 and Windows Phone 8
Smartphones. In Australasian Conference on Information Security and Privacy (pp.
430-437). Springer, Cham.
URL: https://global.blackberry.com/en/software/smartphones/blackberry-10-os.
Summary:
Blackberry 10 is well known mobile operating system which was mainly
Supplementary Assessment Term2, 2017 Page: 3 / 16
Various core technologies like Perpendicular Magnetic recording, Tunnel
Magneto Resistive Read Sensor (TMR), Hybrid of solid state drive and hard disk
drive and many other technologies have changed the manufacturing business. In last
few years the taste and choice of consumers have changed a lot where consumer can
easily get several terabyte of space at a very low price (Igami, 2015). At present the
hard disk are very small in size and the weight is even less than few hundred grams.
This has been possible due to research work and it has open door to various new
platform like cloud storage, data centre which are digital in nature, sharing of
services.
The above resource was useful as it has provided us a large number of
information related to hard drive. The resource has detail information about
manufacturing of hard disk right from its discovery.
Task 2
The text discusses the components and activities of operating systems. Over the last decade,
there was an increase of mobile devices in the market. The Apple iOS, Google Android, and
Microsoft Windows Mobile may be the most familiar operating systems found in many mobile
devices. However, there are other mobile devices that do not use these OS. Find and
summarise a resource that describes ONE other mobile OS that is not listed above. The
selected mobile OS should be currently in use in mobile devices.
Title and Reference:
BlackBerry 10
Goasduff, L. and Pettey, C., 2012. Gartner says worldwide smartphone sales soared in
fourth quarter of 2011 with 47 percent growth. Visited April.
Rahulamathavan, Y., Moonsamy, V., Batten, L., Shunliang, S. and Rajarajan, M.,
2014, July. An analysis of tracking settings in Blackberry 10 and Windows Phone 8
Smartphones. In Australasian Conference on Information Security and Privacy (pp.
430-437). Springer, Cham.
URL: https://global.blackberry.com/en/software/smartphones/blackberry-10-os.
Summary:
Blackberry 10 is well known mobile operating system which was mainly
Supplementary Assessment Term2, 2017 Page: 3 / 16
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

COIT20246 ICT Services Management -T2, 2017 Supplementary Assignment
developed by blackberry limited. The resource is all about Blackberry 10 and all the
details has been provided in details. This particular operating system works on the
QNX which is a well-known operating system. The resource has been selected as it
provides detail information about well-known operating system that is Blackberry 10.
Blackberry 10 supports application framework which provide runtime for
running various Android application. This particular operating system supports some
framework of Qt and some features of Android runtime for running or performing
various android application (Goasduff and Pettey, 2012). Blackberry is considered to
be a well-known application for maintaining privacy and security in their various
smartphones. With the development of latest version of Blackberry and anti-theft
protection this particular version allows the user to completely disallow the device in
the case when the device is lost or stolen. This particular version of blackberry
provides a platform by which device cannot be reactivated or easily accessed by
anyone else. By making use of blackberry blend the productivity across various
device is easily maintained. It also provides a fresh, new design look which are
completely based on the feedback of customer.
Blackberry version of provides great business and productivity of application
by making of use of Android games and application which is generally available at
app store (Rahulamathavan et al., 2014). Latest version of blackberry that is 10.3
provides allow various manager to have proper management of various things like
email, contacts and calendar. It generally helps in the execution of various task like
emails, proper arrangement of emails.
The resource is useful as provide various information as it provides various
upgraded features to its user. It has provided us with some of important features like
antitheft technology so that device cannot have reactivated easily by anyone else.
Supplementary Assessment Term2, 2017 Page: 4 / 16
developed by blackberry limited. The resource is all about Blackberry 10 and all the
details has been provided in details. This particular operating system works on the
QNX which is a well-known operating system. The resource has been selected as it
provides detail information about well-known operating system that is Blackberry 10.
Blackberry 10 supports application framework which provide runtime for
running various Android application. This particular operating system supports some
framework of Qt and some features of Android runtime for running or performing
various android application (Goasduff and Pettey, 2012). Blackberry is considered to
be a well-known application for maintaining privacy and security in their various
smartphones. With the development of latest version of Blackberry and anti-theft
protection this particular version allows the user to completely disallow the device in
the case when the device is lost or stolen. This particular version of blackberry
provides a platform by which device cannot be reactivated or easily accessed by
anyone else. By making use of blackberry blend the productivity across various
device is easily maintained. It also provides a fresh, new design look which are
completely based on the feedback of customer.
Blackberry version of provides great business and productivity of application
by making of use of Android games and application which is generally available at
app store (Rahulamathavan et al., 2014). Latest version of blackberry that is 10.3
provides allow various manager to have proper management of various things like
email, contacts and calendar. It generally helps in the execution of various task like
emails, proper arrangement of emails.
The resource is useful as provide various information as it provides various
upgraded features to its user. It has provided us with some of important features like
antitheft technology so that device cannot have reactivated easily by anyone else.
Supplementary Assessment Term2, 2017 Page: 4 / 16
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

COIT20246 ICT Services Management -T2, 2017 Supplementary Assignment
Task 3
Data networks had traditionally relied on copper cables for its connectivity. However, short-
range wireless connectivity to networks using WiFi increased in use because of the
proliferation of mobile devices. Find and summarise ONE resource that describes
developments (in the last 5 years) with focus on either WiFi or other shorter-range wireless
network connection technology.
Title and Reference:
WI-FI
Duarte, M., Sabharwal, A., Aggarwal, V., Jana, R., Ramakrishnan, K.K., Rice, C.W.
and Shankaranarayanan, N.K., 2014. Design and characterization of a full-duplex
multiantenna system for WiFi networks. IEEE Transactions on Vehicular
Technology, 63(3), pp.1160-1177.
Lee, K., Lee, J., Yi, Y., Rhee, I. and Chong, S., 2013. Mobile data offloading: How
much can WiFi deliver? IEEE/ACM Transactions on Networking (TON), 21(2),
pp.536-550.
URL: https://www.wired.com/2003/05/wifirevolution/
Summary:
This resource is all about evolution of WI-FI in the last five years. The
resource has clearly stated the importance and use of WI-FI like it provides unwiring
of living room, making of Wi-Fi for crossing the last mile and lastly converging with
cell phone (Duarte et al., 2014). The resource has provided all the detail information
regarding three standard that it 802.11b, 802.11a, 802.11g has been discussed in
details.
This particular resources have been selected because it contains detail
information of three standards of WI-FI that is 802.11b, 802.11a, 802.11g and various
advantages of WI-FI technology has been discussed in details.
Previously digital media has grown in large from MP3 to DVD and this
technology has almost taken various electronic equipment’s. On the contrary latest
electronic maker were unable to come up with a common standard. WI-FI has been
able to overcome the issue and has become the most common solution for linking
various together like music, video and phones with very less amount of effort. The
Supplementary Assessment Term2, 2017 Page: 5 / 16
Task 3
Data networks had traditionally relied on copper cables for its connectivity. However, short-
range wireless connectivity to networks using WiFi increased in use because of the
proliferation of mobile devices. Find and summarise ONE resource that describes
developments (in the last 5 years) with focus on either WiFi or other shorter-range wireless
network connection technology.
Title and Reference:
WI-FI
Duarte, M., Sabharwal, A., Aggarwal, V., Jana, R., Ramakrishnan, K.K., Rice, C.W.
and Shankaranarayanan, N.K., 2014. Design and characterization of a full-duplex
multiantenna system for WiFi networks. IEEE Transactions on Vehicular
Technology, 63(3), pp.1160-1177.
Lee, K., Lee, J., Yi, Y., Rhee, I. and Chong, S., 2013. Mobile data offloading: How
much can WiFi deliver? IEEE/ACM Transactions on Networking (TON), 21(2),
pp.536-550.
URL: https://www.wired.com/2003/05/wifirevolution/
Summary:
This resource is all about evolution of WI-FI in the last five years. The
resource has clearly stated the importance and use of WI-FI like it provides unwiring
of living room, making of Wi-Fi for crossing the last mile and lastly converging with
cell phone (Duarte et al., 2014). The resource has provided all the detail information
regarding three standard that it 802.11b, 802.11a, 802.11g has been discussed in
details.
This particular resources have been selected because it contains detail
information of three standards of WI-FI that is 802.11b, 802.11a, 802.11g and various
advantages of WI-FI technology has been discussed in details.
Previously digital media has grown in large from MP3 to DVD and this
technology has almost taken various electronic equipment’s. On the contrary latest
electronic maker were unable to come up with a common standard. WI-FI has been
able to overcome the issue and has become the most common solution for linking
various together like music, video and phones with very less amount of effort. The
Supplementary Assessment Term2, 2017 Page: 5 / 16

COIT20246 ICT Services Management -T2, 2017 Supplementary Assignment
ultimate goal of central server will be back off is to minimize various records, store
music (Lee et al., 2013). As soon as the living network is wireless network the very
big era of internet will arrive which upgrade the broadband services.
The resource has been useful as it provides advantages of WI-FI and its
evolution in last 5 years. The following advantages like unwiring of living room,
coverage provided by WI-FI. The details of 802.11b has been provided which is
considered as the basic standard.
Task 4
Protocols are important in network communications. They can provide reliability and efficiency
in a communication link. One application layer (L5) protocol discussed was HTTP. Find and
summarise a resource that describes the features and uses of ONE other common
application layer (L5) protocol that is not discussed in the text (i.e. NOT HTTP).
Title and Reference:
SMTP (Simple mail transfer protocol)
URL: http://www.geeksforgeeks.org/simple-mail-transfer-protocol-smtp/
Costa, C. and Oliveira, J.L., 2012. Telecardiology through ubiquitous Internet
services. International journal of medical informatics, 81(9), pp.612-621.
Stringhini, G., Egele, M., Zarras, A., Holz, T., Kruegel, C. and Vigna, G., 2012,
August. B@ bel: Leveraging Email Delivery for Spam Mitigation. In USENIX
Security Symposium (pp. 16-32).
Summary:
The following source is about simple mail transfer protocol (SMTP). Emails
are considered to be one of the most valuable service (Stringhini et al., 2012). Most of
the internet based system make use of SMTP as method or technique used for
transferring mail from one user to next other.
The following resource provides information about the SMTP fundamental,
Supplementary Assessment Term2, 2017 Page: 6 / 16
ultimate goal of central server will be back off is to minimize various records, store
music (Lee et al., 2013). As soon as the living network is wireless network the very
big era of internet will arrive which upgrade the broadband services.
The resource has been useful as it provides advantages of WI-FI and its
evolution in last 5 years. The following advantages like unwiring of living room,
coverage provided by WI-FI. The details of 802.11b has been provided which is
considered as the basic standard.
Task 4
Protocols are important in network communications. They can provide reliability and efficiency
in a communication link. One application layer (L5) protocol discussed was HTTP. Find and
summarise a resource that describes the features and uses of ONE other common
application layer (L5) protocol that is not discussed in the text (i.e. NOT HTTP).
Title and Reference:
SMTP (Simple mail transfer protocol)
URL: http://www.geeksforgeeks.org/simple-mail-transfer-protocol-smtp/
Costa, C. and Oliveira, J.L., 2012. Telecardiology through ubiquitous Internet
services. International journal of medical informatics, 81(9), pp.612-621.
Stringhini, G., Egele, M., Zarras, A., Holz, T., Kruegel, C. and Vigna, G., 2012,
August. B@ bel: Leveraging Email Delivery for Spam Mitigation. In USENIX
Security Symposium (pp. 16-32).
Summary:
The following source is about simple mail transfer protocol (SMTP). Emails
are considered to be one of the most valuable service (Stringhini et al., 2012). Most of
the internet based system make use of SMTP as method or technique used for
transferring mail from one user to next other.
The following resource provides information about the SMTP fundamental,
Supplementary Assessment Term2, 2017 Page: 6 / 16
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

COIT20246 ICT Services Management -T2, 2017 Supplementary Assignment
protocol of SMTP, various details related to sending and receiving of email has been
provided by resource.
SMTP is type of application layer protocol in which the client or user opens
up a TCP connection of the server of SMTP and after that it provides a proper mail
for establishment of connection. SMTP is always considered to be listening mode on
the contrary as soon it has orders for TCP connection from the any client it initiates a
process on the port. After that a successful TCP connection process is initiated and the
mail is send instantly (Costa and Oliveira, 2012). Two type of SMTP model has been
discussed which are end to end user and store to forward user. The communication
between server and receiver has been established by making use of MTA. The
ultimate goal of MTA is to transfer the various mail across the network to MTA
present at the receiver.
The resource was useful as it provided some of vital information regarding
the fundamentals of SMTP, Protocol based on SMTP, importance of MTA for
establishment of communication has been discussed above.
Task 5
Cyber-attacks on private or government ICT assets have become more disruptive as reported
by the media. Find and summarise a resource that describes ONE recent cyber-attack
(within the last 3 years) against a private or public infrastructure. (Note: an attack on an
individual account or a web-site is not valid for this task.).
Title and Reference:
Wannacry ransomware
URL: https://www.theguardian.com/technology/2017/may/12/nhs-ransomware-cyber-
attack-what-is-wanacrypt0r-20
Martin, G., Kinross, J. and Hankin, C., 2017. Effective cybersecurity is fundamental
to patient safety.
Mohurle, S. and Patil, M., 2017. A brief study of wannacry threat: Ransomware attack
2017. International Journal, 8(5).
Supplementary Assessment Term2, 2017 Page: 7 / 16
protocol of SMTP, various details related to sending and receiving of email has been
provided by resource.
SMTP is type of application layer protocol in which the client or user opens
up a TCP connection of the server of SMTP and after that it provides a proper mail
for establishment of connection. SMTP is always considered to be listening mode on
the contrary as soon it has orders for TCP connection from the any client it initiates a
process on the port. After that a successful TCP connection process is initiated and the
mail is send instantly (Costa and Oliveira, 2012). Two type of SMTP model has been
discussed which are end to end user and store to forward user. The communication
between server and receiver has been established by making use of MTA. The
ultimate goal of MTA is to transfer the various mail across the network to MTA
present at the receiver.
The resource was useful as it provided some of vital information regarding
the fundamentals of SMTP, Protocol based on SMTP, importance of MTA for
establishment of communication has been discussed above.
Task 5
Cyber-attacks on private or government ICT assets have become more disruptive as reported
by the media. Find and summarise a resource that describes ONE recent cyber-attack
(within the last 3 years) against a private or public infrastructure. (Note: an attack on an
individual account or a web-site is not valid for this task.).
Title and Reference:
Wannacry ransomware
URL: https://www.theguardian.com/technology/2017/may/12/nhs-ransomware-cyber-
attack-what-is-wanacrypt0r-20
Martin, G., Kinross, J. and Hankin, C., 2017. Effective cybersecurity is fundamental
to patient safety.
Mohurle, S. and Patil, M., 2017. A brief study of wannacry threat: Ransomware attack
2017. International Journal, 8(5).
Supplementary Assessment Term2, 2017 Page: 7 / 16
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

COIT20246 ICT Services Management -T2, 2017 Supplementary Assignment
Summary:
The source is about malicious software WannaCry which hit the Britain
National Health Service and some of the largest organization which are present in the
countries like Russia, Ukraine and Taiwan.
The source has been selected because it provided detail information regarding
the WannaCry ransomware which claim to hit several organization of the world.
Ransomware is type of malware which blocks the access to important data containing
information and in return it demands money to release it (Martin, Kinross and Hankin,
2017). This particular source has been selected as it contains the detail information
regarding the spreading mechanism of this attack.
WannaCry Ransomware is a malware which affected many organizations.
Before the release of files Microsoft release an affected version of which cannot be
used to spread malware. On the contrary due to the lack of resources latest updates
were not made possible, organization are more focusing to install such security on a
global scale (Mohurle and Patil, 2017). The attack lasted for short interval of time.
After the payment received by hackers through bitcoin. The reason behind the
targeting of NHS has been discussed it details in this source.
The resource was useful as provided details information regarding the
wannaCry ransomware attack. Working principle regarding this WannaCry
Ransomware attack has discussed in detail. Spreading mechanism of this attack has
been discussed in details.
Task 6
Society is increasingly reliant on networks and network technologies. Failure in ICT services
can hamper and seriously disrupt business operations. Find and summarise a resource that
Supplementary Assessment Term2, 2017 Page: 8 / 16
Summary:
The source is about malicious software WannaCry which hit the Britain
National Health Service and some of the largest organization which are present in the
countries like Russia, Ukraine and Taiwan.
The source has been selected because it provided detail information regarding
the WannaCry ransomware which claim to hit several organization of the world.
Ransomware is type of malware which blocks the access to important data containing
information and in return it demands money to release it (Martin, Kinross and Hankin,
2017). This particular source has been selected as it contains the detail information
regarding the spreading mechanism of this attack.
WannaCry Ransomware is a malware which affected many organizations.
Before the release of files Microsoft release an affected version of which cannot be
used to spread malware. On the contrary due to the lack of resources latest updates
were not made possible, organization are more focusing to install such security on a
global scale (Mohurle and Patil, 2017). The attack lasted for short interval of time.
After the payment received by hackers through bitcoin. The reason behind the
targeting of NHS has been discussed it details in this source.
The resource was useful as provided details information regarding the
wannaCry ransomware attack. Working principle regarding this WannaCry
Ransomware attack has discussed in detail. Spreading mechanism of this attack has
been discussed in details.
Task 6
Society is increasingly reliant on networks and network technologies. Failure in ICT services
can hamper and seriously disrupt business operations. Find and summarise a resource that
Supplementary Assessment Term2, 2017 Page: 8 / 16

COIT20246 ICT Services Management -T2, 2017 Supplementary Assignment
describes ONE example of one such recent failure (within the last 3 years) in the
transportation industry that had serious impact on commerce. You should not use any
examples covered in the textbook.
Title and Reference:
Failure of ICT in transport industry
URL: https://www.lexology.com/library/detail.aspx?g=cca9ae3a-2fa7-4550-9445-
39bc32a4c3ff
Palmer, D. and Warren, I., 2013. Zonal banning and public order in urban
Australia. Policing cities: Urban securitisation and regulation in a 21st century
world, pp.79-96.
Victoria, A.T. and Davey, B., 2013. Major eGovernment projects in health, education
and transport in Victoria.
Summary:
Complex ICT projects generally consists of high degree of risk which
consist of high degree of risk and sustainable cost and claims to deliver benefits.
Various cases have been provided regarding the failure of ICT in transport industry.
The source has been selected because it provides detail information
regarding various failure cases of implementation of ICT in various domains.
Victorian Transport Ticketing Authority has been selected for this report (Palmer and
Warren, 2013). Victorian Transport Ticketing Authority is currently replacing the
present ticketing system with a new a card technology known as smartcard
technology.
In this new technology passenger can easily touch on and off for all the
trams and buses throughout grid of transport which is available in metropolitan city.
From the initial stage the project suffered a large number of issue as the member of
TTA does not have detail skill and information regarding the transport ticketing
environment (Victoria and Davey, 2013). The project suffered a lot of negotiation
regarding which is inclusive of various documentation. The contract of lacked some
specificity and which result in creation of misunderstanding about the various
available documents.
Supplementary Assessment Term2, 2017 Page: 9 / 16
describes ONE example of one such recent failure (within the last 3 years) in the
transportation industry that had serious impact on commerce. You should not use any
examples covered in the textbook.
Title and Reference:
Failure of ICT in transport industry
URL: https://www.lexology.com/library/detail.aspx?g=cca9ae3a-2fa7-4550-9445-
39bc32a4c3ff
Palmer, D. and Warren, I., 2013. Zonal banning and public order in urban
Australia. Policing cities: Urban securitisation and regulation in a 21st century
world, pp.79-96.
Victoria, A.T. and Davey, B., 2013. Major eGovernment projects in health, education
and transport in Victoria.
Summary:
Complex ICT projects generally consists of high degree of risk which
consist of high degree of risk and sustainable cost and claims to deliver benefits.
Various cases have been provided regarding the failure of ICT in transport industry.
The source has been selected because it provides detail information
regarding various failure cases of implementation of ICT in various domains.
Victorian Transport Ticketing Authority has been selected for this report (Palmer and
Warren, 2013). Victorian Transport Ticketing Authority is currently replacing the
present ticketing system with a new a card technology known as smartcard
technology.
In this new technology passenger can easily touch on and off for all the
trams and buses throughout grid of transport which is available in metropolitan city.
From the initial stage the project suffered a large number of issue as the member of
TTA does not have detail skill and information regarding the transport ticketing
environment (Victoria and Davey, 2013). The project suffered a lot of negotiation
regarding which is inclusive of various documentation. The contract of lacked some
specificity and which result in creation of misunderstanding about the various
available documents.
Supplementary Assessment Term2, 2017 Page: 9 / 16
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

COIT20246 ICT Services Management -T2, 2017 Supplementary Assignment
The resource was useful as it provides detail information regarding complexity
of various ICT projects. The issue of Victorian Transport Ticketing Authority has
been selected for this project.
Task 7
Ecommerce had an overwhelming impact on traditional retail businesses. Many businesses
that had adopted this and have become successful in the sale and delivery of their products.
Find and summarise a resource that describes the history of ONE such traditional business
that became and remain successful because of this. You should not use any examples
covered in the textbook.
Title and Reference:
MH Industry
URL: http://www.selfgrowth.com/articles/the-impact-of-e-commerce-on-the-traditional-
companies
Katawetawaraks, C. and Cheng, L.W., 2013. Online shopper behavior: Influences of
online shopping decision.
Zhou, L., Zhang, P. and Zimmermann, H.D., 2013. Social commerce research: An
integrated view. Electronic commerce research and applications, 12(2), pp.61-68.
Summary:
E-commerce is something new to the traditional retail business. Ecommerce
is an online commerce which generally consist of retail shopping, banking, stocks and
bonds. With the development of ecommerce various traditional business has been
affected. Various organization round the globe has been affected due to the help of
ecommerce. Ecommerce is quietly different traditional business.
The following resource has been selected as it provides detail information
regarding the organization (Katawetawaraks, and Cheng, 2013). It has provided the
list of benefits which the ecommerce industry can get easily. Ecommerce provided a
lot of benefit to this organization that is MH industry Co. It provided the advantages
like saving of labour cost, build-up which is given to ecommerce and it will increase
the sales channel. E-commerce is different from traditional business. Ecommerce
Supplementary Assessment Term2, 2017 Page: 10 / 16
The resource was useful as it provides detail information regarding complexity
of various ICT projects. The issue of Victorian Transport Ticketing Authority has
been selected for this project.
Task 7
Ecommerce had an overwhelming impact on traditional retail businesses. Many businesses
that had adopted this and have become successful in the sale and delivery of their products.
Find and summarise a resource that describes the history of ONE such traditional business
that became and remain successful because of this. You should not use any examples
covered in the textbook.
Title and Reference:
MH Industry
URL: http://www.selfgrowth.com/articles/the-impact-of-e-commerce-on-the-traditional-
companies
Katawetawaraks, C. and Cheng, L.W., 2013. Online shopper behavior: Influences of
online shopping decision.
Zhou, L., Zhang, P. and Zimmermann, H.D., 2013. Social commerce research: An
integrated view. Electronic commerce research and applications, 12(2), pp.61-68.
Summary:
E-commerce is something new to the traditional retail business. Ecommerce
is an online commerce which generally consist of retail shopping, banking, stocks and
bonds. With the development of ecommerce various traditional business has been
affected. Various organization round the globe has been affected due to the help of
ecommerce. Ecommerce is quietly different traditional business.
The following resource has been selected as it provides detail information
regarding the organization (Katawetawaraks, and Cheng, 2013). It has provided the
list of benefits which the ecommerce industry can get easily. Ecommerce provided a
lot of benefit to this organization that is MH industry Co. It provided the advantages
like saving of labour cost, build-up which is given to ecommerce and it will increase
the sales channel. E-commerce is different from traditional business. Ecommerce
Supplementary Assessment Term2, 2017 Page: 10 / 16
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

COIT20246 ICT Services Management -T2, 2017 Supplementary Assignment
industry aims in providing proper channel for distribution (Zhou, Zhang and
Zimmermann, 2013). Ecommerce create a channel for distribution for the existing
production this organization that is MH Industry. This has ultimately helped the
organization in establishing a successful platform for the organization.
The resource was useful as it provides all the detail information regarding the
M H industry and how it became successful. It provides the information regarding the
benefits of using the ecommerce like online payment and tradition will attract a lot of
customers. Ecommerce industry can be helpful increasing the selling of product by
making the whole world as a platform for selling of goods.
Task 8
With the advent of mass data collection and storage by many large commercial companies
and government agencies, there is a growing sense of the increase risk for abuse by these
organisations. Find and summarise a resource that describes ONE example where massive
data collection had been misused or abused by a commercial business or a government
agency. You should not use any examples covered in the textbook.
Title and Reference:
Misuse of Data Collection
URL: https://www.observeit.com/blog/importance-data-misuse-prevention-and-detection/
Beresford, A.R., Kübler, D. and Preibusch, S., 2012. Unwillingness to pay for
privacy: A field experiment. Economics Letters, 117(1), pp.25-27.
Zyskind, G. and Nathan, O., 2015, May. Decentralizing privacy: Using blockchain to
protect personal data. In Security and Privacy Workshops (SPW), 2015 IEEE (pp.
180-184). IEEE.
Summary:
The following source is about misuse of data in various well known
organization of data. The source provides detail information regarding the various
cases of misuse of data. The following source reveals the detail information about the
misuse of data. The sensitive data after being stolen is sold to various third parties
who can find various methods to misuse the given data.
The following source has been selected because it provides detail information
Supplementary Assessment Term2, 2017 Page: 11 / 16
industry aims in providing proper channel for distribution (Zhou, Zhang and
Zimmermann, 2013). Ecommerce create a channel for distribution for the existing
production this organization that is MH Industry. This has ultimately helped the
organization in establishing a successful platform for the organization.
The resource was useful as it provides all the detail information regarding the
M H industry and how it became successful. It provides the information regarding the
benefits of using the ecommerce like online payment and tradition will attract a lot of
customers. Ecommerce industry can be helpful increasing the selling of product by
making the whole world as a platform for selling of goods.
Task 8
With the advent of mass data collection and storage by many large commercial companies
and government agencies, there is a growing sense of the increase risk for abuse by these
organisations. Find and summarise a resource that describes ONE example where massive
data collection had been misused or abused by a commercial business or a government
agency. You should not use any examples covered in the textbook.
Title and Reference:
Misuse of Data Collection
URL: https://www.observeit.com/blog/importance-data-misuse-prevention-and-detection/
Beresford, A.R., Kübler, D. and Preibusch, S., 2012. Unwillingness to pay for
privacy: A field experiment. Economics Letters, 117(1), pp.25-27.
Zyskind, G. and Nathan, O., 2015, May. Decentralizing privacy: Using blockchain to
protect personal data. In Security and Privacy Workshops (SPW), 2015 IEEE (pp.
180-184). IEEE.
Summary:
The following source is about misuse of data in various well known
organization of data. The source provides detail information regarding the various
cases of misuse of data. The following source reveals the detail information about the
misuse of data. The sensitive data after being stolen is sold to various third parties
who can find various methods to misuse the given data.
The following source has been selected because it provides detail information
Supplementary Assessment Term2, 2017 Page: 11 / 16

COIT20246 ICT Services Management -T2, 2017 Supplementary Assignment
regarding various organization like Uber (Beresford, Kübler, and Preibusch, 2012).
Various cases of misuse of data that is 88 police man found the misuse of personal
data, Florida supreme court cases has been discussed in details.
Misuse of data like theft can led to things like theft which can be easily
achieved through various flaws and mistakes. Sensitive data which is collected
through various flaws and mistake is later sold to third parties by which various
agencies can easily find various ways to make misuse of data. This source provides us
with details about the organization like Uber where an employee violated the rules by
making use of God View Tool for tracking a journalist who was late for interview
(Zyskind and Nathan, 2015). This god view application allows employees to track
both Uber vehicles and the customers. This particular action violated the rules and
regulation of personal data.
The resource was useful as it provided detail information various cases of misuse
of personal data. This following source has provided us with detail information
regarding the various cases of misuse of data.
Task 9
The failure to adapt business processes and embrace technology, particularly ICT, has led to
the downfall of many previously successful companies. Find and summarise a resource that
describes ONE example of an organisation that failed to adapt to changes in technology and
explain what the organisation failed to do/respond to. (Note: this task is not about specific
product failure – read the question carefully.)
Title and Reference:
KODAK
King, A.A. and Baatartogtokh, B., 2015. How useful is the theory of disruptive
innovation?. MIT Sloan Management Review, 57(1), p.77.
Moliterno, J.E., 2012. The Trouble with Lawyer Regulation. Emory LJ, 62, p.885.
URL: https://www.insidermonkey.com/blog/10-companies-that-failed-to-innovate-and-change-
572511/2/
Supplementary Assessment Term2, 2017 Page: 12 / 16
regarding various organization like Uber (Beresford, Kübler, and Preibusch, 2012).
Various cases of misuse of data that is 88 police man found the misuse of personal
data, Florida supreme court cases has been discussed in details.
Misuse of data like theft can led to things like theft which can be easily
achieved through various flaws and mistakes. Sensitive data which is collected
through various flaws and mistake is later sold to third parties by which various
agencies can easily find various ways to make misuse of data. This source provides us
with details about the organization like Uber where an employee violated the rules by
making use of God View Tool for tracking a journalist who was late for interview
(Zyskind and Nathan, 2015). This god view application allows employees to track
both Uber vehicles and the customers. This particular action violated the rules and
regulation of personal data.
The resource was useful as it provided detail information various cases of misuse
of personal data. This following source has provided us with detail information
regarding the various cases of misuse of data.
Task 9
The failure to adapt business processes and embrace technology, particularly ICT, has led to
the downfall of many previously successful companies. Find and summarise a resource that
describes ONE example of an organisation that failed to adapt to changes in technology and
explain what the organisation failed to do/respond to. (Note: this task is not about specific
product failure – read the question carefully.)
Title and Reference:
KODAK
King, A.A. and Baatartogtokh, B., 2015. How useful is the theory of disruptive
innovation?. MIT Sloan Management Review, 57(1), p.77.
Moliterno, J.E., 2012. The Trouble with Lawyer Regulation. Emory LJ, 62, p.885.
URL: https://www.insidermonkey.com/blog/10-companies-that-failed-to-innovate-and-change-
572511/2/
Supplementary Assessment Term2, 2017 Page: 12 / 16
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 16
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.




