Crypto jacking is a form of malware that steals CPU resources from one computer and transfers them to another for mining cryptocurrencies. It can affect thousands of computers and devices, using outdated coins like Bitcoin and Monero. Hackers use malware scripts or in-browser JavaScript code to initiate these attacks.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Management ICT service management
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
I C Ts e r v i c em a n a g e m e n tP a g e|1 Week 1 The text discusses examples of traditional mass storage such as magnetic disk and solid-state drives.While these still underpin most mass storage, in corporate environments they are often accessed via Network Attached Storage (NAS) or Storage Area Network (SAN) technologies.Find and summariseONEresource that describesEITHERNAS or SAN storage technologies.The resource, and your summary, must focus on either NAS or SAN,NOT BOTH. Title: What is NAS (Network Attached Storage) and Why is NAS Important for Small Businesses? Reference: Seagate. 2019. What is NAS (Network Attached Storage) and Why is NAS ImportantforSmallBusinesses?Availableat:Seagate. https://www.seagate.com/as/en/tech-insights/what-is-nas-master-ti/ Title:SAN/NAS integrated storage system. Reference: Tanaka, A., Hashimoto, A. and Hirako, N., Hitachi Ltd, 2007.SAN/NAS integratedstoragesystem.U.S.Patent7,185,143.:Availableat: https://patents.google.com/patent/US7185143B2/en Today in all the corporate environment, the companies tend to either use SAN i.e. Storage Area Network or NAS i.e. Network Attached Storage in order to store huge mass of data. Storage Area Network is defined as a specialized, higher speed network which aims at providing block level network access to store data. SANs are majorly made of hosts, switches, storage elements and many storage devices which are interlinked by using several technology methods, topologies and protocols in any organization. SAN is not easy to maintain and the cost involved in it is very high which cannot be easily maintained by any small business organisations (Seagate, 2019).
I C Ts e r v i c em a n a g e m e n tP a g e|2 On the contrary, Network Attached Storage is defined as one of the delicate storage for file which helps several users and dissimilar client devices to extract required data from a centralized disk capacity. In addition to this, users on LAN i.e. Local Area Network access the shared storage with the help of a verified and standard Ethernet connection. The devises related to NAS do not use any keyboard or display system and they are typically managed and controlled by browser based utility. Every NAS depends on theLANand is denoted by a different and uniqueIP location. Furthermore, it can also be noted that NAS works as private cloud in any company or professional workplace. The advantages for such type of network is that it is faster, not so expensive and serves all the advantages of a public cloud on site which provides full control (Tanaka et al., 2007). Week 2 Operatingsystemsusefilemanagerstointeractwithmassstoragedevices. However, the way in which data is stored and retrieved is dictated by the file system. There are many types of file systems used by modern operating systems. Find and summariseONEresource that describesONEsuch file system that isNOTFAT, FAT32 or ExFAT. The resource, and your summary, must focus onA SINGLEfile system. Title: Inferring file system of solid state drives based on current consumption Reference: Melton, J., Rakvic, R., Shey, J., Ngo, H., Walker, O., Blanco, J., Brown, D., McDowell, L. and Fairbanks, K.D., 2017, July. Inferring file system of solid state drives based on current consumption. In 2017 IEEE 7th Annual International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER) (pp. 72- 76). IEEE. Available at:https://ieeexplore.ieee.org/abstract/document/8446154 Title: NTFS File System Reference:Fisher,T.,2019.NTFSFileSystem.Availableat:
I C Ts e r v i c em a n a g e m e n tP a g e|3 https://www.lifewire.com/ntfs-file-system-2625948 There are different types of file which are widely used by modern operating system. One of the majorly used file system is NTFS i.e. New Technology File System. NTFS is a standard structure of file used by the windows NT operating system. The main aim of such network is to extract and store huge mass of files on the hard disk. Additionally, NTFS also announced several enhancements which include innovative and modern structures of data which helps in increasing the performance, enhance metadata and further add developments such as security access control, disk space operation and file system journaling (Melton et al., 2017). The NTFS swapped the OS/2 higher performance file system i.e. HPFS and the Windows 95 file allocation table i.e. FAT which are commonly used in MS-DOS and initial versions of Operating system. The innovative and modern advantage of NTFS involves a fault tolerance system which itself repairs the error that take place in hard drive without any error messages or information. NTFS also holds summarized transaction records which aims at keeping the track record of error in hard drives. Such quality is an advantage for improving files in case if hard drive damages and avoids hard disk failures (Fisher, 2019). Week 3 The National Broadband Network (NBN) is currently being rolled-out across Australia and there is a mix of technologies that are being used to deliver Internet services (for example, FTTN, FTTC, FTTP, HFC, fixed wireless and satellite). Find and summarise ONEresource that describesONEof these delivery technologies. The resource, and your summary, must focus onA SINGLEtechnology. Title: What is fixed wireless internet? Reference:Rutnik,M.,2018.Whatisfixedwirelessinternet?Availableat:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
I C Ts e r v i c em a n a g e m e n tP a g e|4 https://www.androidauthority.com/what-is-fixed-wireless-internet-831394/ Title:Wireless powered communication networks: An overview Reference:Bi, S., Zeng, Y. and Zhang, R., 2016. Wireless powered communication networks: An overview.IEEE Wireless Communications,23(2), pp.10-18. Available at: https://ieeexplore.ieee.org/abstract/document/7462480 In today’s era, there are huge number of technologies which are commonly used in order to deliver internet services to the users. Some of them are, FTTN, FTTC, FTTP, HFC, fixed wireless and satellite (Bi, Zeng and Zhang, 2016). However, a part of all these technologies, fixed wireless connection has major advantages which can be easily differentiated by other technologies. Fixed wireless connection aims at utilizing data which is transmitted over radio signals to connect a location to the broadband access network. Such type of connection is majorly used under conditions where distance measured between the premises is in kilometers. Data movements from one transmission tower which is approximately located 14km to outside antenna which is fixed to the premises by an approved installer. Fixed wireless internet is totally different from other many common internet connections such as DSL and Fiber. Despite of using Cable, it supports to provide internet signal to houses with the medium of radio waves which can easily be transmitted by a base station. Such connection is very easy to install and do not need any physical cables to connect. Internet providers also do not require to set any data caps which is general with other cellular internet services. In addition to this, it also provides high speed downloads which is comparatively faster than other broad band services (Rutnik, 2018). Week 4
I C Ts e r v i c em a n a g e m e n tP a g e|5 The Internet is made up of many interconnected servers and networks.Users are increasingly awareand concerned that their Internet communications can be intercepted and monitored.Toris one technology that allows users to obscure or hide online their online activities. Find and summariseONEresource that describes what Tor is and how it works. The resource, and your summary, must focus purely on Tor. Title: Tor Network Reference:Thewindowsclub.2018.TorNetwork.Availableat: https://www.thewindowsclub.com/what-is-tor-network Title:EXPOSING THE TOR FAILURES ON MOBILE DEVICES USING PARABEN'S E3: DS TECHNOLOGY. Reference:Don, T., Wimmer, H., Chen, L. and Booker, Q.E., 2018. EXPOSING THE TOR FAILURES ON MOBILE DEVICES USING PARABEN'S E3: DS TECHNOLOGY.Issues in InformationSystems,19(1).Availableat: file:///C:/Users/Asus/Downloads/Documents/1_iis_2018_58-67.pdf The word “TOR” can mention various components. TOR is majorly a program which can be started on our computer. It provides help by safeguarding the data used throughtheinternet.Itpreventsourentiredataandhelpsinbouncing communications over a distributed network of relays which is processed and started by many volunteers all over the world. It avoids other who examine one internet connection and does not provide a chance to share any activities or any physical location as well. TOR network can be used with TOR browser which is an updated version of Firefox which aims at solving huge number of privacy issues and concerns
I C Ts e r v i c em a n a g e m e n tP a g e|6 (The windows club, 2018). The use of internet is not at all secured because there are lots many information that can easily be hacked and exchanged without anybody’s concern. One might not be aware about the data and information being hacked and transferred to other places. Therearemanyillegalactivities which takesplaceandseizesyourpersonal information. So, in order to prevent such issues, the use and access of fingertips is used which helps to avoid such frauds to some extent. And the use of TOR network perfectly suits here because it routes the user’s system internet traffic over various location on the internet. It does not show actual source of communication and also hides the user’s identity (Don, Wimmer, Chen and Booker,2018). Week 5 An emerging form of malware is crypto jacking (also known as malicious crypto mining). Find and summariseONEresource that describes what crypto jacking is and how it works.The resource, and your summary, should focus purely on crypto jacking andNO OTHERform(s) of malware. Title:Crypto mining attacks in information systems: an emerging threat to cyber security Reference:Zimba, A., Wang, Z., Mulenga, M. and Odongo, N.H., 2018. Crypto mining attacks in information systems: an emerging threat to cyber security.Journal of ComputerInformationSystems,pp.1-12.Availableat: https://www.tandfonline.com/doi/abs/10.1080/08874417.2018.1477076 Title:What is crypto jacking? How it works and how to help prevent it. Reference:Symantic corporation, 2019. What is crypto jacking? How it works and
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
I C Ts e r v i c em a n a g e m e n tP a g e|7 howtohelppreventit.Availableat:https://us.norton.com/internetsecurity- malware-what-is-cryptojacking.html Crypto Jacking is defined as stealing resources of processing units of computer i.e. CPU from one computer and transferring it to another computer. It is not only one computer but it is thousands of computers and desktops, windows servers and mobile phone devises, since crypto mining of outdated coins like Bitcoins and Monero uses huge amount of CPU. It is one of the most powerful way that can easily be used by the hackers to create a competition against authoritative computers which are widely used to mine such coins. Several cyber criminals tend to focus on mining additional unidentified coins like ZCash and Monero to prevent any sort of tracking. Such type of attacks will be widely used in next several years (Zimba et al., 2018). Recently, there are two major methods used to start a crypto Jacking attacks. These are Malware Scripts and In- Browser Java script Code. In Malware scripts, users can easily download a link which include malware and automatically download a code which can be installed in one’s computer in order to create the whole mining process. In such cases, no anti viruses work and fails to provide any protection. This method aims at targeting various computers by injecting harmful Java scripts codeintoawebpage.Anycomputerwhichbrowsesthesimilarpagewill automatically be crypto Jacked. This method of Jacking is widely used by huge mass of population. In 2018, in-browser crypto jacking raised up by 31%, and it was found in 33,000 sites with 1 billion monthly visits (Symantic corporation, 2019). Week 6 Redundancy is a critical aspect of network design, implemented in order to cope link
I C Ts e r v i c em a n a g e m e n tP a g e|8 or equipment failure. One frequent cause of failure is damage to fibre optic cables that connect countries and/or continents. Find and summariseONEresource that describesONEexample of such a cable being cut or damaged.The resource, and your summary, should describe the impacts ofA SINGLE EXAMPLEof a link failure. Note that the failure must relate to a link that connects countries and/or continents. Title:Disaster survivability in optical communication networks. Reference:Habib, M.F., Tornatore, M., Dikbiyik, F. and Mukherjee, B., 2013. Disaster survivability in optical communication networks.Computer Communications,36(6), pp.630-644.Availableat: https://www.sciencedirect.com/science/article/pii/S0140366413000224 Title: Causes of Fiber Cut and the Recommendation to Solve the Problem Reference: Hayford-Acquah, T and Asante, B. 2017. Causes of Fiber Cut and the RecommendationtoSolvetheProblem.IOSRJournalofElectronicsand CommunicationEngineering(IOSR-JECE)e-ISSN:2278-2834,p-ISSN:2278- 8735.Volume12,Issue1,Ver.I,PP46-64.Availableat: file:///C:/Users/Asus/Downloads/Documents/H1201014664.pdf Redundancy takes place to prevent equipment failure. The technology serves an optimised qualities and benefits which is prior to copper based and wireless backhaultransmissionclarifications.Takingthisundercircumstances,various network operators in the technology industry situated in Ghana have positioned many kilometres of optical fibre network infrastructures across the length and breadth of the country in their auction in order to provide a high quality of network which will satisfy and create a source of joy to their required customers (Habib et al., 2013). On the other hand, despite of superior and eye catching features and qualities of optical fibre technology, each telecom operators rely in order to enhance network
I C Ts e r v i c em a n a g e m e n tP a g e|9 coverage to several locations of the country. Thus, in addition to this, it can be stated that the major reason of persistent fibre cuts majorly examined in the telecom industry situated in Ghana with a powerful conviction that the result of the investigation when applied will enhance on local network quality of services delivery of the several network operations. These are attributed to quick fibre cuts, minimize the total cost of operations and also enhance the level of customer satisfaction (Hayford and Asante, 2017). Week 7 Since the 1990s, Enterprise Systems (also known as Enterprise Resource Planning systems) have become critical to the operation modern organisations.Over this time, ES/ERPs have evolved and continue to change in response to new demands and emerging technologies. Find and summariseONEresource that discusses emerging or future trends for ES/ERPs.The resource should be recent (published since the beginning of 2017) and it and your summary should clearly identify how ES/ERPs are, or are about to, change. Title:Interconnected Enterprise Systems. Reference:Schneider, B., Asprion, P.M. and Grimberg, F., 2018, June. Interconnected Enterprise Systems. InInternational Conference on Computational Science(pp. 318- 331).Springer,Cham.Availableat: file:///C:/Users/Asus/Downloads/Documents/52100635.pdf Title: Five Trends that Will Shape the Future of ERP. Reference: Matthews, D., 2018. Five Trends that Will Shape the Future of ERP. Availableat:https://www.industryweek.com/technology/five-trends-will-shape-
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
I C Ts e r v i c em a n a g e m e n tP a g e|10 future-erp In this modern era of technology, every business aims at dealing with updated and modern technology with a great experience which the company had never felt earlier. There are many advancements such as consumerization of Information Technology have taught the CIOs capability in order to control what sort of technologies can be commonly used when combined with corporate network. Recently a common trend of BYOD i.e. Bring Your Own Device has made a continuous impact on huge number of organization. Several IT departments has adopted this modern technology. In addition to this, ERP i.e. Enterprise Resource Planning is also widely used in various industry and it is considered as one of the most updated technology. It aims at providing huge number of benefits and assist organization to opt for modern innovation technologies (Schneider, 2018). Thus, it can be stated that, If ERP will be implemented in a correct and better way in upcoming future, these mentioned trends can easily be shaped. The technology trends include IOT i.e. Internet of Things, Wearable Technology, Big Data Analytics, Age of contexts and starting organizations to innovation (Matthews, 2018). Week 8 Databases, mass data storage and interrogation technologies underpin virtually all Information Systems and applications. However, the same tools also make it easier fordatabreachestooccuringovernmentdepartmentsorprivate companies/organisations.Insimpleterms,adatabreachiswhereprivate information is illegally obtained or disclosed. Find and summariseONEresource that describesONEexample of a data breach that has occurred since the beginning of 2017. The resource, and your summary, should focus purely onA SINGLE EXAMPLE of a data breach.
I C Ts e r v i c em a n a g e m e n tP a g e|11 Title: 2017 Data Breaches. Reference:Daitch,H.,2017.2017DataBreaches.Availableat: https://www.identityforce.com/blog/2017-data-breaches Data breach is defined as the illegal way of disclosing personal information. In the year 2017, 17thFebruary, a similar case of Data Breach was found which was assumed to be one of the worst breach that took place in the beginning of the year. The breach took place in the company named “Arby’s”. Arby is known as the national fast food chain which got involved in data breach after being pressed by the website Krebsonsecurity. The company were informed at the beginning of the year i.e. in the month of January about the miss happenings in chosen restaurants but the FBI inquired the company not to disclose this news in front if public. Malware were located on the systems of payment mode which were located inside the corporate stores of Arby. The corporate stores of Arby comprise of one third of the total Arby’s in the nation. It is assumed that there are nearly 1000 corporate stores controlled by Arby’s but not all of them were affected. Thus, the actual amount of stores affected were not actually disclosed. Later on, it was announced by the company that the malware that took place was removed but the area of the breach is not known till then. Arby’s denied to disclose the actual time when the breach took place but an individual credit union thinks that the actual breach took place in between October 25, 2016 and January 19, 2017 (Daitch, 2017). Week 9 Agile development is an iterative and incremental approach to delivering systems - it is particularly useful where the requirements are unclear or evolving.Scrum is a framework for undertaking agile development. Find and summariseONEresource that describesScrum.The resource, and your summary, should focus purely on
I C Ts e r v i c em a n a g e m e n tP a g e|12 Scrum and discuss some of its key features and attributes. Title: What is Scrum? Reference:Drumond,C.,2019.WhatisScrum?Availableat: https://www.atlassian.com/agile/scrum Title:A teamwork model for understanding an agile team: A case study of a Scrum project. Reference:Moe, N.B., Dingsøyr, T. and Dybå, T., 2010. A teamwork model for understanding an agile team: A case study of a Scrum project.Information and SoftwareTechnology,52(5),pp.480-491.Availableat: https://www.sciencedirect.com/science/article/abs/pii/S0950584909002043 Scrum is defined as the frame work which aims at supporting team work together. It is quite similar to rugby team and it got this name for the same. Scrum helps in motivating and influencing various team to learn new thing by experiencing and self- organizing. This can take place by working on the issues and reflecting on the pros side and improving the cons side under any circumstances (Drumond, 2019). Generally, people gets confused with Scrum and Agile. They considered both of them to be same because Scrum is centred around a continuous improvement which is a basic principle of agile. On the other hand, Scrum is stated as a set of framework which helps in getting things done while agile is considered to be just a mindset. One cannot actually “Go agile” as it takes permission form the entire team in order to alter the way they believe regarding delivering values to their customers and users. But in such cases, Scrum can easily be used that will assist to start thinking in the similar way and also help in using agile principles in any workplace environment. Thus, it can also be summarized that Scrum is heuristic by nature and this is totally
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
I C Ts e r v i c em a n a g e m e n tP a g e|13 based on the ongoing learning process. It is also quite adjustable to the changing factors (Moe, Dingsøyrv and Dybå, 2010). Week 10 The textbook discusses activities associated with project management.However, it could be argued that project governance is equally important, especially in very large projects. Find and summariseONEresource that describes what project governance is and what activities it entails. The resource, and your summary, should focus purely on project governance. Title: Governance rules! The principles of effective project governance. Reference: Kelly, É. V. 2010. Governance rules! The principles of effective project governance.PaperpresentedatPMI®GlobalCongress2010—NorthAmerica, Washington, DC. Newtown Square, PA: Project Management Institute. Available at: https://www.pmi.org/learning/library/project-governance-principles-corporate- perspective-6528 Title:Projectmanagement:asystemsapproachtoplanning,scheduling,and controlling. Reference:Kerzner, H. and Kerzner, H.R., 2017.Project management: a systems approach to planning, scheduling, and controlling. John Wiley & Sons. Project Governance is defined as the theory to address and find an interconnection between internal governance and the accomplishment of the predefined purposes. According to the study, it was found that governance of a project includes a bunch of relationships that take place among project management, sponsors, owner and various stakeholder. In addition to this, project governance also aims at serving the
I C Ts e r v i c em a n a g e m e n tP a g e|14 structure by which the purpose of the whole project is set and the objective of gaining all those goals and controlling the overall performance are pre-determined. This type of governance helps to make sure the compliance which meet with the implementation of standards (Kerzner, 2017). Such type of governance has several roles and activities carried out (Kelly, 2010). Executive Sponsor(s) Steering Committee Project Manager/Director