COIT 20246: Networking Technologies and Applications
VerifiedAdded on 2025/05/05
|12
|3864
|81
AI Summary
Desklib provides solved assignments and past papers to help students succeed.

COIT 20246 ASSIGNMENT SUBMISSION
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Please fill in the following details:
Student Name
Student Number
Tutor’s Name
Instructions
It will be necessary to use online resources to complete this assignment, please
ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use
your own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is
a table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Each summary should briefly explain:
- What the resource is about
- Why you selected it
- What are the main points or key information covered in the resource
- Why the resource was useful.
For more advice about how to complete the assignment, as well as examples and
information about selecting good resources, please see the assessment page on the
Moodle unit web site:
https://moodle.cqu.edu.au/mod/assign/view.php?id=886270
1
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Please fill in the following details:
Student Name
Student Number
Tutor’s Name
Instructions
It will be necessary to use online resources to complete this assignment, please
ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use
your own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is
a table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Each summary should briefly explain:
- What the resource is about
- Why you selected it
- What are the main points or key information covered in the resource
- Why the resource was useful.
For more advice about how to complete the assignment, as well as examples and
information about selecting good resources, please see the assessment page on the
Moodle unit web site:
https://moodle.cqu.edu.au/mod/assign/view.php?id=886270
1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Week 1
The text discusses examples of traditional mass storage such as magnetic disk and
solid-state drives. While these still underpin most mass storage, in corporate
environments, they are often accessed via Network Attached Storage (NAS) or
Storage Area Network (SAN) technologies. Find and summarise ONE resource that
describes EITHER NAS or SAN storage technologies. The resource, and your
summary must focus on either NAS or SAN, NOT BOTH.
Title and Reference:
Network-Attached Storage (NAS)
Rouse, M 2018, network-attached storage (NAS), viewed 29 May
2019, https://searchstorage.techtarget.com/definition/network-attached-storage
Summary:
NAS stands for Network Attached Storage device. A dedicated storage device for a
particular network connected with servers and clients. NAS provides a centralised
connection to the network devices like heterogeneous client systems and main
server. By installing NAS into a particular server with multiple client systems and
server system, it allows those systems to retrieve data once saved with this storage.
NAS is connected with a local internet network like LAN with its own unique IP or
Internet Protocol.
There is no keyboard or display screen attached to the NAS storage device. To
access, configure or manage NAS from various connected servers a browser centred
utility is used where the user can access its particular unique IP address and
managed it. Use of NAS is considered here because of its advantages. NAS comes
with large storage capacity and has ease of accessing it. Also, it isn’t costly
according to its specification and is easily installable into a network.
NAS stores unstructured data like video files, audio files, text files, websites and user
can perform an action with these files like archiving these files, backup and restore
option and also as cloud storage. It is a kind of private cloud that lets the user access
its storage from various places on a condition that those devices should be
connected to the network. To connects system at different locations, NAS should be
connected to a wireless router so that it can work in a distributed environment. NAS
products are classified according to the buyers need like High-end NAS, Midmarket
NAS, Low-end NAS.
Week 2
Operating systems use file managers to interact with mass storage devices.
However, the way in which data is stored and retrieved is dictated by the file system.
There are many types of file systems used by modern operating systems. Find and
summarise ONE resource that describes ONE such file system that is NOT FAT,
FAT32 or ExFAT. The resource, and your summary must focus on A SINGLE file
system.
Title and Reference:
What Is APFS (Apple's File System for macOS)?
2
The text discusses examples of traditional mass storage such as magnetic disk and
solid-state drives. While these still underpin most mass storage, in corporate
environments, they are often accessed via Network Attached Storage (NAS) or
Storage Area Network (SAN) technologies. Find and summarise ONE resource that
describes EITHER NAS or SAN storage technologies. The resource, and your
summary must focus on either NAS or SAN, NOT BOTH.
Title and Reference:
Network-Attached Storage (NAS)
Rouse, M 2018, network-attached storage (NAS), viewed 29 May
2019, https://searchstorage.techtarget.com/definition/network-attached-storage
Summary:
NAS stands for Network Attached Storage device. A dedicated storage device for a
particular network connected with servers and clients. NAS provides a centralised
connection to the network devices like heterogeneous client systems and main
server. By installing NAS into a particular server with multiple client systems and
server system, it allows those systems to retrieve data once saved with this storage.
NAS is connected with a local internet network like LAN with its own unique IP or
Internet Protocol.
There is no keyboard or display screen attached to the NAS storage device. To
access, configure or manage NAS from various connected servers a browser centred
utility is used where the user can access its particular unique IP address and
managed it. Use of NAS is considered here because of its advantages. NAS comes
with large storage capacity and has ease of accessing it. Also, it isn’t costly
according to its specification and is easily installable into a network.
NAS stores unstructured data like video files, audio files, text files, websites and user
can perform an action with these files like archiving these files, backup and restore
option and also as cloud storage. It is a kind of private cloud that lets the user access
its storage from various places on a condition that those devices should be
connected to the network. To connects system at different locations, NAS should be
connected to a wireless router so that it can work in a distributed environment. NAS
products are classified according to the buyers need like High-end NAS, Midmarket
NAS, Low-end NAS.
Week 2
Operating systems use file managers to interact with mass storage devices.
However, the way in which data is stored and retrieved is dictated by the file system.
There are many types of file systems used by modern operating systems. Find and
summarise ONE resource that describes ONE such file system that is NOT FAT,
FAT32 or ExFAT. The resource, and your summary must focus on A SINGLE file
system.
Title and Reference:
What Is APFS (Apple's File System for macOS)?
2

Nelson, T 2019, What Is APFS (Apple's File System for macOS)?, viewed 29 May
2019, https://www.lifewire.com/apple-apfs-file-system-4117093
Summary:
Apple Inc. has been using its file system in their macOS, iOS from a long time. This
file system is known as APFS or Apple File System. This file system is used to
organize and structure data in a storage system. Apple’s OS like macOS and iOS
were using a 30-year-old HFS+ (Hierarchical File System) that used to work with
800kb storage limit floppy devices which were large digital storage of that time before
APFS. APFS was originally launched with Sierra in 2017 for the macOS 10.12.4 and
iOS 10.3. Now Apple has set the APFS for its entire product with Sierra like macOS,
iOS, watchOS, tvOS and for all the upcoming products.
APFS was initially designed for the SSDs or Solid State Devices and flash storage
devices to make them able to access with the current Apple operating systems like
macOS, iOS. Although it was designed for the SSD devices yet it works really good
with new hard-disk drives.
APFS comes with numerous features that clearly distinguish it from other file
systems. Its features are like:
Encryption: APFS provides the feature of encryption of full disk with by using modes
like AES-CBC or AES-XTS. Where it provides single key, multi-key and no clear
encryption types.
Snapshot: A read-only pointer of the original data and volume is called Snapshots.
APFS can now produce this snapshot feature for the user.
Cloning: APFS is able to provide the cloning feature to the user to save additional
space for a single file available at different location consuming double memory
space. In this, the user can clone a file to another location with reference and this
clone file will auto-changed as the changes are made in the main file.
3
2019, https://www.lifewire.com/apple-apfs-file-system-4117093
Summary:
Apple Inc. has been using its file system in their macOS, iOS from a long time. This
file system is known as APFS or Apple File System. This file system is used to
organize and structure data in a storage system. Apple’s OS like macOS and iOS
were using a 30-year-old HFS+ (Hierarchical File System) that used to work with
800kb storage limit floppy devices which were large digital storage of that time before
APFS. APFS was originally launched with Sierra in 2017 for the macOS 10.12.4 and
iOS 10.3. Now Apple has set the APFS for its entire product with Sierra like macOS,
iOS, watchOS, tvOS and for all the upcoming products.
APFS was initially designed for the SSDs or Solid State Devices and flash storage
devices to make them able to access with the current Apple operating systems like
macOS, iOS. Although it was designed for the SSD devices yet it works really good
with new hard-disk drives.
APFS comes with numerous features that clearly distinguish it from other file
systems. Its features are like:
Encryption: APFS provides the feature of encryption of full disk with by using modes
like AES-CBC or AES-XTS. Where it provides single key, multi-key and no clear
encryption types.
Snapshot: A read-only pointer of the original data and volume is called Snapshots.
APFS can now produce this snapshot feature for the user.
Cloning: APFS is able to provide the cloning feature to the user to save additional
space for a single file available at different location consuming double memory
space. In this, the user can clone a file to another location with reference and this
clone file will auto-changed as the changes are made in the main file.
3
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Week 3
The National Broadband Network (NBN) is currently being rolled-out across Australia
and there is a mix of technologies that are being used to deliver Internet services (for
example, FTTN, FTTC, FTTP, HFC, fixed wireless and satellite). Find and
summarise ONE resource that describes ONE of these delivery technologies. The
resource, and your summary, must focus on A SINGLE technology.
Title and Reference:
What’s the Difference Between FTTC and FTTP, and Why Should You Care?
Bolduc, T 2015, What’s the Difference Between FTTC and FTTP, and Why Should
You Care?, viewed 29 May 2019, https://www.makeuseof.com/tag/whats-difference-
fttc-fttp-care/
Summary:
Fibre-to-the-Premises or FTTP are also known as Fibre to the Home or FTTH. This is
a kind of communication technology in which an optical cable made of fibre is used to
transmit information and data through it. These fibre cables are used for the
information transmission in them using the formula or phenomenon of total internal
reflection. In total internal reflection phenomenon, it is said that when a light is
passed from an ideal medium which can reflect all the light waves without any loss of
light particles or negligible loss of particles, then the light can stay forever in that
medium. Here this phenomenon is used to transmit information. Data files are carried
on the fibre cables and modulated with a light wave. Hence the data can be
transmitted by light speed. This fibre cable is covered with plastic cases. These
plastic cases act as a mirror and reflect light.
These Fibre cables are then connected to a particular home or business office and
the analogue signal is converted to a digital signal and modulated on a laser from the
internet service provider (ISP) or one end of the fibre cable and demodulated on the
other end or to the house of the user. FTTH connections are costly than the other
same connections like FTTC, FTTN because fibre cables are costly and when these
are connected to a home or office network, the users have to pay more for the cable
as they are having an individual connection. Since all the connection is made of fibre
cable without copper wire use, this transfers the data with a higher speed of 330
Mb/s than others.
Week 4
The Internet is made up of many interconnected servers and networks. Users are
increasingly aware and concerned that their Internet communications can be
intercepted and monitored. Tor is one technology that allows users to obscure or
hide online their online activities. Find and summarise ONE resource that describes
what Tor is and how it works. The resource, and your summary must focus purely on
Tor.
Title and Reference:
WHAT IS TOR BROWSER?
4
The National Broadband Network (NBN) is currently being rolled-out across Australia
and there is a mix of technologies that are being used to deliver Internet services (for
example, FTTN, FTTC, FTTP, HFC, fixed wireless and satellite). Find and
summarise ONE resource that describes ONE of these delivery technologies. The
resource, and your summary, must focus on A SINGLE technology.
Title and Reference:
What’s the Difference Between FTTC and FTTP, and Why Should You Care?
Bolduc, T 2015, What’s the Difference Between FTTC and FTTP, and Why Should
You Care?, viewed 29 May 2019, https://www.makeuseof.com/tag/whats-difference-
fttc-fttp-care/
Summary:
Fibre-to-the-Premises or FTTP are also known as Fibre to the Home or FTTH. This is
a kind of communication technology in which an optical cable made of fibre is used to
transmit information and data through it. These fibre cables are used for the
information transmission in them using the formula or phenomenon of total internal
reflection. In total internal reflection phenomenon, it is said that when a light is
passed from an ideal medium which can reflect all the light waves without any loss of
light particles or negligible loss of particles, then the light can stay forever in that
medium. Here this phenomenon is used to transmit information. Data files are carried
on the fibre cables and modulated with a light wave. Hence the data can be
transmitted by light speed. This fibre cable is covered with plastic cases. These
plastic cases act as a mirror and reflect light.
These Fibre cables are then connected to a particular home or business office and
the analogue signal is converted to a digital signal and modulated on a laser from the
internet service provider (ISP) or one end of the fibre cable and demodulated on the
other end or to the house of the user. FTTH connections are costly than the other
same connections like FTTC, FTTN because fibre cables are costly and when these
are connected to a home or office network, the users have to pay more for the cable
as they are having an individual connection. Since all the connection is made of fibre
cable without copper wire use, this transfers the data with a higher speed of 330
Mb/s than others.
Week 4
The Internet is made up of many interconnected servers and networks. Users are
increasingly aware and concerned that their Internet communications can be
intercepted and monitored. Tor is one technology that allows users to obscure or
hide online their online activities. Find and summarise ONE resource that describes
what Tor is and how it works. The resource, and your summary must focus purely on
Tor.
Title and Reference:
WHAT IS TOR BROWSER?
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Heller, J 2019, WHAT IS TOR BROWSER?, viewed 29 May 2019, https://www.le-
vpn.com/what-is-tor-browser/
Summary:
Tor is an acronym of The Onion Router. Tor was developed for anonymous
browsing. Initially, Tor was developed for the US Navy and military so that they can
hide their Internet Protocol address from others so that they can securely work on
their mission without getting caught. This multiple-proxy network was developed for
them so that they can also secure their internal confidential data from external thefts
and unauthorized access of malware and malicious software that can bring down
their system in order to catch confidential data. When the US military got their own
in-house VPN based anonymous system, they opened Tor for the public to use them
for their work for free.
Working of Tor can be explained as Tor do not work with any specific proxy server
networks to process data anonymously but it uses another Tor’s users ID to hide
their original ID on to the network. Hence, there are approximately 3 million people
using Tor and interchanging their IP address. To use Tor, one can normally
download the Tor browser form to the internet and access the internet in any system
as Tor is designed for all systems like windows, android, macOS, Linux.
Tor works on three ways in which first is ‘You as User’ second is ‘The User Network’
and ‘The request complier’.
5
vpn.com/what-is-tor-browser/
Summary:
Tor is an acronym of The Onion Router. Tor was developed for anonymous
browsing. Initially, Tor was developed for the US Navy and military so that they can
hide their Internet Protocol address from others so that they can securely work on
their mission without getting caught. This multiple-proxy network was developed for
them so that they can also secure their internal confidential data from external thefts
and unauthorized access of malware and malicious software that can bring down
their system in order to catch confidential data. When the US military got their own
in-house VPN based anonymous system, they opened Tor for the public to use them
for their work for free.
Working of Tor can be explained as Tor do not work with any specific proxy server
networks to process data anonymously but it uses another Tor’s users ID to hide
their original ID on to the network. Hence, there are approximately 3 million people
using Tor and interchanging their IP address. To use Tor, one can normally
download the Tor browser form to the internet and access the internet in any system
as Tor is designed for all systems like windows, android, macOS, Linux.
Tor works on three ways in which first is ‘You as User’ second is ‘The User Network’
and ‘The request complier’.
5

Week 5
An emerging form of malware is crypto jacking (also known as malicious crypto
mining). Find and summarise ONE resource that describes what crypto jacking is
and how it works. The resource, and your summary should focus purely on crypto
jacking and NO OTHER form(s) of malware.
Title and Reference:
What is Cryptojacking? How it Works And How You Can Prevent It
Weiss, T 2018, What is Cryptojacking? How it Works And How You Can Prevent It,
viewed 29 May 2019, https://www.chainbits.com/cryptocurrencies/what-is-
cryptojacking/
Summary:
Factually, Cryptojacking is the process of thieving resources of CPU from one’s
computer or mobile. Cryptojacking is processed by many hackers as unauthorized
access to a computer or mobile device in the world so that they can hack it.
Cryptojacking is generally a technique in which the unauthorized access uses for
mining the cryptocurrency like Bitcoin in someone’s computers or mobile device.
Hackers believe that this is the only way through which they can hack into someone’s
computer to mine the currencies and earn real numbers through them.
There are two methods to process a crypto jacking hack on someone.
Malware Script: In this type, the hackers send a link of any site that a user wants to
access desperately. This link contains mining malware. When a user accesses this
link the malware automatically got installed into that computer or mobile device.
Hacker accesses these devices and mine cryptocurrency until they find them. the
owner of that device doesn’t get to know about it as this malware don’t harm the
device or its speed.
JavaScript Code/ In-Browser: This is also known as drive-by crypto mining. In this
type, a malicious JavaScript code is installed into some website that users often visit.
Any user, that access that page gets attacked by these codes. This way of working
comes out by publishers like gaming and one with technical content. They ask the
user to use their computer resources and get access from them. When users provide
them access, they install the codes and start mining for cryptocurrencies in that
device. In 2018 this kind of attack was very common and about 33,000 sites were
doing this breach with people.
Week 6
Redundancy is a critical aspect of network design, implemented in order to cope link
or equipment failure. One frequent cause of failure is damage to fibre optic cables
that connect countries and/or continents. Find and summarise ONE resource that
describes ONE example of such a cable being cut or damaged. The resource, and
your summary, should describe the impacts of A SINGLE EXAMPLE of a link failure.
Note that the failure must relate to a link that connects countries and/or continents.
Title and Reference:
Entire country taken offline for two days after undersea internet cable cut
6
An emerging form of malware is crypto jacking (also known as malicious crypto
mining). Find and summarise ONE resource that describes what crypto jacking is
and how it works. The resource, and your summary should focus purely on crypto
jacking and NO OTHER form(s) of malware.
Title and Reference:
What is Cryptojacking? How it Works And How You Can Prevent It
Weiss, T 2018, What is Cryptojacking? How it Works And How You Can Prevent It,
viewed 29 May 2019, https://www.chainbits.com/cryptocurrencies/what-is-
cryptojacking/
Summary:
Factually, Cryptojacking is the process of thieving resources of CPU from one’s
computer or mobile. Cryptojacking is processed by many hackers as unauthorized
access to a computer or mobile device in the world so that they can hack it.
Cryptojacking is generally a technique in which the unauthorized access uses for
mining the cryptocurrency like Bitcoin in someone’s computers or mobile device.
Hackers believe that this is the only way through which they can hack into someone’s
computer to mine the currencies and earn real numbers through them.
There are two methods to process a crypto jacking hack on someone.
Malware Script: In this type, the hackers send a link of any site that a user wants to
access desperately. This link contains mining malware. When a user accesses this
link the malware automatically got installed into that computer or mobile device.
Hacker accesses these devices and mine cryptocurrency until they find them. the
owner of that device doesn’t get to know about it as this malware don’t harm the
device or its speed.
JavaScript Code/ In-Browser: This is also known as drive-by crypto mining. In this
type, a malicious JavaScript code is installed into some website that users often visit.
Any user, that access that page gets attacked by these codes. This way of working
comes out by publishers like gaming and one with technical content. They ask the
user to use their computer resources and get access from them. When users provide
them access, they install the codes and start mining for cryptocurrencies in that
device. In 2018 this kind of attack was very common and about 33,000 sites were
doing this breach with people.
Week 6
Redundancy is a critical aspect of network design, implemented in order to cope link
or equipment failure. One frequent cause of failure is damage to fibre optic cables
that connect countries and/or continents. Find and summarise ONE resource that
describes ONE example of such a cable being cut or damaged. The resource, and
your summary, should describe the impacts of A SINGLE EXAMPLE of a link failure.
Note that the failure must relate to a link that connects countries and/or continents.
Title and Reference:
Entire country taken offline for two days after undersea internet cable cut
6
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Baynes, C 2018, Entire country taken offline for two days after undersea internet
cable cut, viewed 29 May
2019, https://www.independent.co.uk/news/world/africa/mauritiana-internet-cut-
underwater-cable-offline-days-west-africa-a8298551.html
Summary:
Mauritania is a country in the north-west of Africa that went offline for about 48 hours
or 2 days because of a network outage undersea. A network cable was provided to
this country by the ACE or African Coast of Europe. This network cable was about
10,500 miles long and placed between South Africa and France. This cable was
placed under the sea or under the western Atlantic ocean for internet transmission.
This optical fibre cable was helping about 22 countries and providing them internet
connection especially the west side of Africa. This outage was firstly reported on the
30th March when it first broke into the capital of Mauritania, Nouakchott and it was
said that it is due to a trawler passing by.
Mauritania especially relies on the ACE to provide them with an internet connection
and when this cable got severed, this country suffered 2 days without the internet
connectivity into it. This comes out to be the first major incident of disconnected
cable that came out since ACE was in effect from 2012. Due to this outage, it is also
said that with Mauritania, several other countries also got affected like Sierra Leone,
Guinea-Bissau, Liberia, Guinea, and the Gambia. In addition to this, nine other
nations from the west side of Africa have experienced the consequence of this
outage.
7
cable cut, viewed 29 May
2019, https://www.independent.co.uk/news/world/africa/mauritiana-internet-cut-
underwater-cable-offline-days-west-africa-a8298551.html
Summary:
Mauritania is a country in the north-west of Africa that went offline for about 48 hours
or 2 days because of a network outage undersea. A network cable was provided to
this country by the ACE or African Coast of Europe. This network cable was about
10,500 miles long and placed between South Africa and France. This cable was
placed under the sea or under the western Atlantic ocean for internet transmission.
This optical fibre cable was helping about 22 countries and providing them internet
connection especially the west side of Africa. This outage was firstly reported on the
30th March when it first broke into the capital of Mauritania, Nouakchott and it was
said that it is due to a trawler passing by.
Mauritania especially relies on the ACE to provide them with an internet connection
and when this cable got severed, this country suffered 2 days without the internet
connectivity into it. This comes out to be the first major incident of disconnected
cable that came out since ACE was in effect from 2012. Due to this outage, it is also
said that with Mauritania, several other countries also got affected like Sierra Leone,
Guinea-Bissau, Liberia, Guinea, and the Gambia. In addition to this, nine other
nations from the west side of Africa have experienced the consequence of this
outage.
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Week 7
Since the 1990s, Enterprise Systems (also known as Enterprise Resource Planning
systems) have become critical to the operation of modern organisations. Over this
time, ES/ERPs have evolved and continue to change in response to new demands
and emerging technologies. Find and summarise ONE resource that discusses
emerging or future trends for ES/ERPs. The resource should be recent (published
since the beginning of 2017) and it and your summary should clearly identify how
ES/ERPs are, or are about to, change.
Title and Reference:
7 ERP Trends to Look For in 2018.
Painchaud, 2018, 7 ERP Trends to Look For in 2018, viewed 29 May
2019, https://www.sherweb.com/blog/dynamics-365/7-erp-trends-2018/
Summary:
ERP or Enterprise Resource Planning is a system of integrated management for the
main business with real-time stamps of business transactions. As these are very
much used by every business process in the market, vendors of ERP are
continuously evolving the software versions by making necessary and advanced
changes to make it more manageable for the industry and essential. They are also
working to make it more powerful, robust, easy to use and affordable as well. Here
are a few changes or trends that ERP is going to take in the future.
1. Internet of Things (IoT): For more data transmission and to provide a secure
and ubiquitous network to the users. The vendors of ERP are looking to
emerge it with IoT devices. But as it is costly because every device can’t use
internet connectivity. It isn’t affordable for ERPs to integrate with IoT. But with
an ecosystem provided by large enterprise, ERP can emerge with IoT without
a doubt.
2. ERP Mobile: everyone is using mobile phones these days’ even
smartphones. They have the access to every mobile app of any company.
This thing can also be introduced with ERP mobile app where people can be
seen managing their business from large desktops and laptops to small
smartphones.
Week 8
Databases, mass data storage and interrogation technologies underpin virtually all
Information Systems and applications. However, the same tools also make it easier
for data breaches to occur in government departments or private
companies/organisations. In simple terms, a data breach is where private
information is illegally obtained or disclosed. Find and summarise ONE resource that
describes ONE example of a data breach that has occurred since the beginning of
2017. The resource, and your summary should focus purely on A SINGLE
EXAMPLE of a data breach.
Title and Reference:
How did the TimeHop data breach happen?.
8
Since the 1990s, Enterprise Systems (also known as Enterprise Resource Planning
systems) have become critical to the operation of modern organisations. Over this
time, ES/ERPs have evolved and continue to change in response to new demands
and emerging technologies. Find and summarise ONE resource that discusses
emerging or future trends for ES/ERPs. The resource should be recent (published
since the beginning of 2017) and it and your summary should clearly identify how
ES/ERPs are, or are about to, change.
Title and Reference:
7 ERP Trends to Look For in 2018.
Painchaud, 2018, 7 ERP Trends to Look For in 2018, viewed 29 May
2019, https://www.sherweb.com/blog/dynamics-365/7-erp-trends-2018/
Summary:
ERP or Enterprise Resource Planning is a system of integrated management for the
main business with real-time stamps of business transactions. As these are very
much used by every business process in the market, vendors of ERP are
continuously evolving the software versions by making necessary and advanced
changes to make it more manageable for the industry and essential. They are also
working to make it more powerful, robust, easy to use and affordable as well. Here
are a few changes or trends that ERP is going to take in the future.
1. Internet of Things (IoT): For more data transmission and to provide a secure
and ubiquitous network to the users. The vendors of ERP are looking to
emerge it with IoT devices. But as it is costly because every device can’t use
internet connectivity. It isn’t affordable for ERPs to integrate with IoT. But with
an ecosystem provided by large enterprise, ERP can emerge with IoT without
a doubt.
2. ERP Mobile: everyone is using mobile phones these days’ even
smartphones. They have the access to every mobile app of any company.
This thing can also be introduced with ERP mobile app where people can be
seen managing their business from large desktops and laptops to small
smartphones.
Week 8
Databases, mass data storage and interrogation technologies underpin virtually all
Information Systems and applications. However, the same tools also make it easier
for data breaches to occur in government departments or private
companies/organisations. In simple terms, a data breach is where private
information is illegally obtained or disclosed. Find and summarise ONE resource that
describes ONE example of a data breach that has occurred since the beginning of
2017. The resource, and your summary should focus purely on A SINGLE
EXAMPLE of a data breach.
Title and Reference:
How did the TimeHop data breach happen?.
8

Burgess, C 2018, How did the TimeHop data breach happen?, viewed 29 May
2019, https://www.csoonline.com/article/3296486/how-did-the-timehop-data-breach-
happen.html
Summary:
In 2018, the month of July, Timehop shared they're experienced about their data
breach which affected the information of about 21 million Timehop users. The PII or
personal identifying information or 21 million users like their name, mobile numbers,
email-id, date of birth were stolen by some unauthorized access. While this data
breach was under investigation, the investigators find out that an internal employee
of the organisation let the unauthorised access to enter into the premises of
company’s private network and harmed the private information of various users.
It is assumed that the intruder first took reconnaissance of company architecture and
way of working by taking the API access and testing it. When the intruder gets to
know that he/she had access to the private network of Timehop by the credentials of
an employee, he/she stepped back. Again after doing some research with that id,
that intruder came back in 2018 and found out the unpopulated data in the database
by that compromised id. When this unpopulated database became populated, the
intruder came back again in July 2018 and started mining the database and stealing
the private information of the users. He/she ran an operation of about 2.5 hours and
when Timehop engineer got to know about the data outside firewall they took action
on it. Timehop still doesn’t know how did the intruder get to the employee credentials.
9
2019, https://www.csoonline.com/article/3296486/how-did-the-timehop-data-breach-
happen.html
Summary:
In 2018, the month of July, Timehop shared they're experienced about their data
breach which affected the information of about 21 million Timehop users. The PII or
personal identifying information or 21 million users like their name, mobile numbers,
email-id, date of birth were stolen by some unauthorized access. While this data
breach was under investigation, the investigators find out that an internal employee
of the organisation let the unauthorised access to enter into the premises of
company’s private network and harmed the private information of various users.
It is assumed that the intruder first took reconnaissance of company architecture and
way of working by taking the API access and testing it. When the intruder gets to
know that he/she had access to the private network of Timehop by the credentials of
an employee, he/she stepped back. Again after doing some research with that id,
that intruder came back in 2018 and found out the unpopulated data in the database
by that compromised id. When this unpopulated database became populated, the
intruder came back again in July 2018 and started mining the database and stealing
the private information of the users. He/she ran an operation of about 2.5 hours and
when Timehop engineer got to know about the data outside firewall they took action
on it. Timehop still doesn’t know how did the intruder get to the employee credentials.
9
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Week 9
Agile development is an iterative and incremental approach to delivering systems - it
is particularly useful where the requirements are unclear or evolving. Scrum is a
framework for undertaking agile development. Find and summarise ONE resource
that describes Scrum. The resource, and your summary, should focus purely on
Scrum and discuss some of its key features and attributes.
Title and Reference:
Quick Guide to Scrum Methodology
Westland, J 2018, Quick Guide to Scrum Methodology, viewed 29 May
2019, https://www.projectmanager.com/blog/scrum-methodology
Summary:
Agile Scrum framework is a part of Agile software development and project
management methodology in which the development part is developed considering
some phases or stages at every sprint. Scrum is basically not for the development of
any project or software but for the beginners that are working on the development
plans for learning the Agile technology with ease. It consists of following mentioned
steps to follow while working on it.
1. Product Backlog: in this step, the project manager or the developer makes a
whole list of the milestones or the things that need to be done under this
project and give each task priority. And according to the work, creates a
timescale for all the jobs. Also, they consider the risks and issues that may
occur while the development phase and creates their mitigation plan.
2. Sprint Planning: in this, the team is divided into two parts where one plans the
milestone and second plans the way to achieve them.
3. Sprint: in this part, the scrums meetings are arranged on a daily and weekly
basis. The team discuss how they are going to complete the next scrum.
4. Scrum Master Oversight: scrum master is the one in any project that works
for the quality of the project completion.
5. Sprint completion: As one sprint is completed, the team discuss its
achievements and issues and discuss the way in which they are going to
achieve newsprint.
6. Review: After the beginning of new spring the team can go back to review
what they have done into the last sprint to get to know about any queries or
issues.
7. Repeat: once this cycle is completed, again this process is followed to until
the development is completed.
Week 10
10
Agile development is an iterative and incremental approach to delivering systems - it
is particularly useful where the requirements are unclear or evolving. Scrum is a
framework for undertaking agile development. Find and summarise ONE resource
that describes Scrum. The resource, and your summary, should focus purely on
Scrum and discuss some of its key features and attributes.
Title and Reference:
Quick Guide to Scrum Methodology
Westland, J 2018, Quick Guide to Scrum Methodology, viewed 29 May
2019, https://www.projectmanager.com/blog/scrum-methodology
Summary:
Agile Scrum framework is a part of Agile software development and project
management methodology in which the development part is developed considering
some phases or stages at every sprint. Scrum is basically not for the development of
any project or software but for the beginners that are working on the development
plans for learning the Agile technology with ease. It consists of following mentioned
steps to follow while working on it.
1. Product Backlog: in this step, the project manager or the developer makes a
whole list of the milestones or the things that need to be done under this
project and give each task priority. And according to the work, creates a
timescale for all the jobs. Also, they consider the risks and issues that may
occur while the development phase and creates their mitigation plan.
2. Sprint Planning: in this, the team is divided into two parts where one plans the
milestone and second plans the way to achieve them.
3. Sprint: in this part, the scrums meetings are arranged on a daily and weekly
basis. The team discuss how they are going to complete the next scrum.
4. Scrum Master Oversight: scrum master is the one in any project that works
for the quality of the project completion.
5. Sprint completion: As one sprint is completed, the team discuss its
achievements and issues and discuss the way in which they are going to
achieve newsprint.
6. Review: After the beginning of new spring the team can go back to review
what they have done into the last sprint to get to know about any queries or
issues.
7. Repeat: once this cycle is completed, again this process is followed to until
the development is completed.
Week 10
10
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

The textbook discusses activities associated with project management. However, it
could be argued that project governance is equally important, especially in very large
projects. Find and summarise ONE resource that describes what project governance
is and what activities it entails. The resource, and your summary, should focus purely
on project governance.
Title and Reference:
Project governance and Project Management Office (PMO).
Bromley, K 2019, Project governance and Project Management Office (PMO),
viewed 29 May
2019, https://www.open.edu/openlearn/ocw/mod/oucontent/view.php?
printable=1&id=27294.
Summary:
Project governance is described as the process in which good decision can be made
for a project. It can be also defined as a process in which some good decisions are
implemented into the project to success it. Project governance includes the following
essential elements in it.
1. Organisation objectives alignment: The project team should be able to
represent the goals of the project on which they are working in front of the
organisation which want the project to be succeeded. It makes the project
outcome clear to both of them and governance ensures that they are working
for the results instead of working on the activities.
2. Delegated authority: A direct accountability chain. In this team members
should know about the project authorities for every point.
3. Reporting: the delegated authorities should work on report progress. And if
they aren’t able to do so, another person with the same responsibility should
be assigned.
4. Independent assurance: project manager should independently check the
progress and other aspects whether the project is going in the right line or
not.
5. Decisions: For the major points and issues the authorities should work with a
common decision so that the project can be continued.
11
could be argued that project governance is equally important, especially in very large
projects. Find and summarise ONE resource that describes what project governance
is and what activities it entails. The resource, and your summary, should focus purely
on project governance.
Title and Reference:
Project governance and Project Management Office (PMO).
Bromley, K 2019, Project governance and Project Management Office (PMO),
viewed 29 May
2019, https://www.open.edu/openlearn/ocw/mod/oucontent/view.php?
printable=1&id=27294.
Summary:
Project governance is described as the process in which good decision can be made
for a project. It can be also defined as a process in which some good decisions are
implemented into the project to success it. Project governance includes the following
essential elements in it.
1. Organisation objectives alignment: The project team should be able to
represent the goals of the project on which they are working in front of the
organisation which want the project to be succeeded. It makes the project
outcome clear to both of them and governance ensures that they are working
for the results instead of working on the activities.
2. Delegated authority: A direct accountability chain. In this team members
should know about the project authorities for every point.
3. Reporting: the delegated authorities should work on report progress. And if
they aren’t able to do so, another person with the same responsibility should
be assigned.
4. Independent assurance: project manager should independently check the
progress and other aspects whether the project is going in the right line or
not.
5. Decisions: For the major points and issues the authorities should work with a
common decision so that the project can be continued.
11

MARKING SHEET - DO NOT DELETE
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the
task; summary fails to explain what the resource was about; the relevance
and/or usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent, but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot
be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content/contains content not contained in the resource) OR
Multiple resources used for a single task
Resource is generic AND/OR covers multiple technologies/examples
rather than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
12
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the
task; summary fails to explain what the resource was about; the relevance
and/or usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent, but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot
be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content/contains content not contained in the resource) OR
Multiple resources used for a single task
Resource is generic AND/OR covers multiple technologies/examples
rather than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
12
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 12
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.