COIT20246 ICT Service Management: Summaries of Online Resources

Verified

Added on  2023/03/30

|15
|3543
|261
Homework Assignment
AI Summary
This assignment consists of weekly summaries of online resources related to various aspects of ICT service management. Week 1 focuses on network storage technologies, specifically NAS (Network Attached Storage) and SAN (Storage Area Network), highlighting their differences and advantages. Week 2 discusses file systems, with a focus on NTFS (New Technology File System), its features, and its improvements over older file systems. Week 3 summarizes NBN (National Broadband Network) delivery technologies, focusing on fixed wireless connections and their benefits over other broadband options. Week 4 explores the Tor network, explaining its purpose in obscuring online activities and protecting user privacy. Week 5 examines crypto jacking, an emerging form of malware, and its methods of operation, including malware scripts and in-browser JavaScript code. Finally, Week 6 discusses network redundancy, focusing on the impact of fiber optic cable damage connecting countries and continents. Each summary provides key information and insights from the selected resources.
Document Page
Management
ICT service management
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
I C T s e r v i c e m a n a g e m e n t P a g e | 1
Week 1
The text discusses examples of traditional mass storage such as magnetic disk and
solid-state drives. While these still underpin most mass storage, in corporate
environments they are often accessed via Network Attached Storage (NAS) or
Storage Area Network (SAN) technologies. Find and summarise ONE resource that
describes EITHER NAS or SAN storage technologies. The resource, and your
summary, must focus on either NAS or SAN, NOT BOTH.
Title: What is NAS (Network Attached Storage) and Why is NAS Important for Small
Businesses?
Reference: Seagate. 2019. What is NAS (Network Attached Storage) and Why is NAS
Important for Small Businesses? Available at: Seagate.
https://www.seagate.com/as/en/tech-insights/what-is-nas-master-ti/
Title: SAN/NAS integrated storage system.
Reference: Tanaka, A., Hashimoto, A. and Hirako, N., Hitachi Ltd, 2007. SAN/NAS
integrated storage system. U.S. Patent 7,185,143. : Available at:
https://patents.google.com/patent/US7185143B2/en
Today in all the corporate environment, the companies tend to either use SAN i.e.
Storage Area Network or NAS i.e. Network Attached Storage in order to store huge
mass of data.
Storage Area Network is defined as a specialized, higher speed network which aims
at providing block level network access to store data. SANs are majorly made of
hosts, switches, storage elements and many storage devices which are interlinked by
using several technology methods, topologies and protocols in any organization. SAN
is not easy to maintain and the cost involved in it is very high which cannot be easily
maintained by any small business organisations (Seagate, 2019).
Document Page
I C T s e r v i c e m a n a g e m e n t P a g e | 2
On the contrary, Network Attached Storage is defined as one of the delicate storage
for file which helps several users and dissimilar client devices to extract required
data from a centralized disk capacity. In addition to this, users on LAN i.e. Local Area
Network access the shared storage with the help of a verified and standard Ethernet
connection. The devises related to NAS do not use any keyboard or display system
and they are typically managed and controlled by browser based utility. Every NAS
depends on the LAN and is denoted by a different and unique IP location.
Furthermore, it can also be noted that NAS works as private cloud in any company or
professional workplace. The advantages for such type of network is that it is faster,
not so expensive and serves all the advantages of a public cloud on site which
provides full control (Tanaka et al., 2007).
Week 2
Operating systems use file managers to interact with mass storage devices.
However, the way in which data is stored and retrieved is dictated by the file system.
There are many types of file systems used by modern operating systems. Find and
summarise ONE resource that describes ONE such file system that is NOT FAT, FAT32
or ExFAT. The resource, and your summary, must focus on A SINGLE file system.
Title: Inferring file system of solid state drives based on current consumption
Reference: Melton, J., Rakvic, R., Shey, J., Ngo, H., Walker, O., Blanco, J., Brown, D.,
McDowell, L. and Fairbanks, K.D., 2017, July. Inferring file system of solid state drives
based on current consumption. In 2017 IEEE 7th Annual International Conference on
CYBER Technology in Automation, Control, and Intelligent Systems (CYBER) (pp. 72-
76). IEEE. Available at: https://ieeexplore.ieee.org/abstract/document/8446154
Title: NTFS File System
Reference: Fisher, T., 2019. NTFS File System. Available at:
Document Page
I C T s e r v i c e m a n a g e m e n t P a g e | 3
https://www.lifewire.com/ntfs-file-system-2625948
There are different types of file which are widely used by modern operating system.
One of the majorly used file system is NTFS i.e. New Technology File System. NTFS is
a standard structure of file used by the windows NT operating system. The main aim
of such network is to extract and store huge mass of files on the hard disk.
Additionally, NTFS also announced several enhancements which include innovative
and modern structures of data which helps in increasing the performance, enhance
metadata and further add developments such as security access control, disk space
operation and file system journaling (Melton et al., 2017).
The NTFS swapped the OS/2 higher performance file system i.e. HPFS and the
Windows 95 file allocation table i.e. FAT which are commonly used in MS-DOS and
initial versions of Operating system. The innovative and modern advantage of NTFS
involves a fault tolerance system which itself repairs the error that take place in hard
drive without any error messages or information. NTFS also holds summarized
transaction records which aims at keeping the track record of error in hard drives.
Such quality is an advantage for improving files in case if hard drive damages and
avoids hard disk failures (Fisher, 2019).
Week 3
The National Broadband Network (NBN) is currently being rolled-out across Australia
and there is a mix of technologies that are being used to deliver Internet services (for
example, FTTN, FTTC, FTTP, HFC, fixed wireless and satellite). Find and summarise
ONE resource that describes ONE of these delivery technologies. The resource, and
your summary, must focus on A SINGLE technology.
Title: What is fixed wireless internet?
Reference: Rutnik, M., 2018. What is fixed wireless internet? Available at:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
I C T s e r v i c e m a n a g e m e n t P a g e | 4
https://www.androidauthority.com/what-is-fixed-wireless-internet-831394/
Title: Wireless powered communication networks: An overview
Reference: Bi, S., Zeng, Y. and Zhang, R., 2016. Wireless powered communication
networks: An overview. IEEE Wireless Communications, 23(2), pp.10-18. Available at:
https://ieeexplore.ieee.org/abstract/document/7462480
In today’s era, there are huge number of technologies which are commonly used in
order to deliver internet services to the users. Some of them are, FTTN, FTTC, FTTP,
HFC, fixed wireless and satellite (Bi, Zeng and Zhang, 2016).
However, a part of all these technologies, fixed wireless connection has major
advantages which can be easily differentiated by other technologies. Fixed wireless
connection aims at utilizing data which is transmitted over radio signals to connect a
location to the broadband access network. Such type of connection is majorly used
under conditions where distance measured between the premises is in kilometers.
Data movements from one transmission tower which is approximately located 14km
to outside antenna which is fixed to the premises by an approved installer. Fixed
wireless internet is totally different from other many common internet connections
such as DSL and Fiber. Despite of using Cable, it supports to provide internet signal
to houses with the medium of radio waves which can easily be transmitted by a base
station. Such connection is very easy to install and do not need any physical cables to
connect. Internet providers also do not require to set any data caps which is general
with other cellular internet services. In addition to this, it also provides high speed
downloads which is comparatively faster than other broad band services (Rutnik,
2018).
Week 4
Document Page
I C T s e r v i c e m a n a g e m e n t P a g e | 5
The Internet is made up of many interconnected servers and networks. Users are
increasingly aware and concerned that their Internet communications can be
intercepted and monitored. Tor is one technology that allows users to obscure or
hide online their online activities. Find and summarise ONE resource that describes
what Tor is and how it works. The resource, and your summary, must focus purely
on Tor.
Title: Tor Network
Reference: The windows club. 2018. Tor Network. Available at:
https://www.thewindowsclub.com/what-is-tor-network
Title: EXPOSING THE TOR FAILURES ON MOBILE DEVICES USING PARABEN'S E3: DS
TECHNOLOGY.
Reference: Don, T., Wimmer, H., Chen, L. and Booker, Q.E., 2018. EXPOSING THE TOR
FAILURES ON MOBILE DEVICES USING PARABEN'S E3: DS TECHNOLOGY. Issues in
Information Systems, 19(1). Available at:
file:///C:/Users/Asus/Downloads/Documents/1_iis_2018_58-67.pdf
The word “TOR” can mention various components. TOR is majorly a program which
can be started on our computer. It provides help by safeguarding the data used
through the internet. It prevents our entire data and helps in bouncing
communications over a distributed network of relays which is processed and started
by many volunteers all over the world. It avoids other who examine one internet
connection and does not provide a chance to share any activities or any physical
location as well. TOR network can be used with TOR browser which is an updated
version of Firefox which aims at solving huge number of privacy issues and concerns
Document Page
I C T s e r v i c e m a n a g e m e n t P a g e | 6
(The windows club, 2018).
The use of internet is not at all secured because there are lots many information that
can easily be hacked and exchanged without anybody’s concern. One might not be
aware about the data and information being hacked and transferred to other places.
There are many illegal activities which takes place and seizes your personal
information. So, in order to prevent such issues, the use and access of fingertips is
used which helps to avoid such frauds to some extent. And the use of TOR network
perfectly suits here because it routes the user’s system internet traffic over various
location on the internet. It does not show actual source of communication and also
hides the user’s identity (Don, Wimmer, Chen and Booker,2018).
Week 5
An emerging form of malware is crypto jacking (also known as malicious crypto
mining). Find and summarise ONE resource that describes what crypto jacking is and
how it works. The resource, and your summary, should focus purely on crypto
jacking and NO OTHER form(s) of malware.
Title: Crypto mining attacks in information systems: an emerging threat to cyber
security
Reference: Zimba, A., Wang, Z., Mulenga, M. and Odongo, N.H., 2018. Crypto mining
attacks in information systems: an emerging threat to cyber security. Journal of
Computer Information Systems, pp.1-12. Available at:
https://www.tandfonline.com/doi/abs/10.1080/08874417.2018.1477076
Title: What is crypto jacking? How it works and how to help prevent it.
Reference: Symantic corporation, 2019. What is crypto jacking? How it works and
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
I C T s e r v i c e m a n a g e m e n t P a g e | 7
how to help prevent it. Available at: https://us.norton.com/internetsecurity-
malware-what-is-cryptojacking.html
Crypto Jacking is defined as stealing resources of processing units of computer i.e.
CPU from one computer and transferring it to another computer. It is not only one
computer but it is thousands of computers and desktops, windows servers and
mobile phone devises, since crypto mining of outdated coins like Bitcoins and
Monero uses huge amount of CPU. It is one of the most powerful way that can easily
be used by the hackers to create a competition against authoritative computers
which are widely used to mine such coins. Several cyber criminals tend to focus on
mining additional unidentified coins like ZCash and Monero to prevent any sort of
tracking. Such type of attacks will be widely used in next several years (Zimba et al.,
2018). Recently, there are two major methods used to start a crypto Jacking attacks.
These are Malware Scripts and In- Browser Java script Code.
In Malware scripts, users can easily download a link which include malware and
automatically download a code which can be installed in one’s computer in order to
create the whole mining process. In such cases, no anti viruses work and fails to
provide any protection.
This method aims at targeting various computers by injecting harmful Java scripts
code into a web page. Any computer which browses the similar page will
automatically be crypto Jacked. This method of Jacking is widely used by huge mass
of population. In 2018, in-browser crypto jacking raised up by 31%, and it was found
in 33,000 sites with 1 billion monthly visits (Symantic corporation, 2019).
Week 6
Redundancy is a critical aspect of network design, implemented in order to cope link
Document Page
I C T s e r v i c e m a n a g e m e n t P a g e | 8
or equipment failure. One frequent cause of failure is damage to fibre optic cables
that connect countries and/or continents. Find and summarise ONE resource that
describes ONE example of such a cable being cut or damaged. The resource, and
your summary, should describe the impacts of A SINGLE EXAMPLE of a link failure.
Note that the failure must relate to a link that connects countries and/or continents.
Title: Disaster survivability in optical communication networks.
Reference: Habib, M.F., Tornatore, M., Dikbiyik, F. and Mukherjee, B., 2013. Disaster
survivability in optical communication networks. Computer Communications, 36(6),
pp.630-644. Available at:
https://www.sciencedirect.com/science/article/pii/S0140366413000224
Title: Causes of Fiber Cut and the Recommendation to Solve the Problem
Reference: Hayford-Acquah, T and Asante, B. 2017. Causes of Fiber Cut and the
Recommendation to Solve the Problem. IOSR Journal of Electronics and
Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834, p- ISSN: 2278-
8735.Volume 12, Issue 1, Ver. I, PP 46-64. Available at:
file:///C:/Users/Asus/Downloads/Documents/H1201014664.pdf
Redundancy takes place to prevent equipment failure. The technology serves an
optimised qualities and benefits which is prior to copper based and wireless
backhaul transmission clarifications. Taking this under circumstances, various
network operators in the technology industry situated in Ghana have positioned
many kilometres of optical fibre network infrastructures across the length and
breadth of the country in their auction in order to provide a high quality of network
which will satisfy and create a source of joy to their required customers (Habib et al.,
2013). On the other hand, despite of superior and eye catching features and qualities
of optical fibre technology, each telecom operators rely in order to enhance network
Document Page
I C T s e r v i c e m a n a g e m e n t P a g e | 9
coverage to several locations of the country. Thus, in addition to this, it can be stated
that the major reason of persistent fibre cuts majorly examined in the telecom
industry situated in Ghana with a powerful conviction that the result of the
investigation when applied will enhance on local network quality of services delivery
of the several network operations. These are attributed to quick fibre cuts, minimize
the total cost of operations and also enhance the level of customer satisfaction
(Hayford and Asante, 2017).
Week 7
Since the 1990s, Enterprise Systems (also known as Enterprise Resource Planning
systems) have become critical to the operation modern organisations. Over this
time, ES/ERPs have evolved and continue to change in response to new demands
and emerging technologies. Find and summarise ONE resource that discusses
emerging or future trends for ES/ERPs. The resource should be recent (published
since the beginning of 2017) and it and your summary should clearly identify how
ES/ERPs are, or are about to, change.
Title: Interconnected Enterprise Systems.
Reference: Schneider, B., Asprion, P.M. and Grimberg, F., 2018, June. Interconnected
Enterprise Systems. In International Conference on Computational Science (pp. 318-
331). Springer, Cham. Available at:
file:///C:/Users/Asus/Downloads/Documents/52100635.pdf
Title: Five Trends that Will Shape the Future of ERP.
Reference: Matthews, D., 2018. Five Trends that Will Shape the Future of ERP.
Available at: https://www.industryweek.com/technology/five-trends-will-shape-
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
I C T s e r v i c e m a n a g e m e n t P a g e | 10
future-erp
In this modern era of technology, every business aims at dealing with updated and
modern technology with a great experience which the company had never felt
earlier. There are many advancements such as consumerization of Information
Technology have taught the CIOs capability in order to control what sort of
technologies can be commonly used when combined with corporate network.
Recently a common trend of BYOD i.e. Bring Your Own Device has made a
continuous impact on huge number of organization. Several IT departments has
adopted this modern technology. In addition to this, ERP i.e. Enterprise Resource
Planning is also widely used in various industry and it is considered as one of the
most updated technology. It aims at providing huge number of benefits and assist
organization to opt for modern innovation technologies (Schneider, 2018).
Thus, it can be stated that, If ERP will be implemented in a correct and better way in
upcoming future, these mentioned trends can easily be shaped. The technology
trends include IOT i.e. Internet of Things, Wearable Technology, Big Data Analytics,
Age of contexts and starting organizations to innovation (Matthews, 2018).
Week 8
Databases, mass data storage and interrogation technologies underpin virtually all
Information Systems and applications. However, the same tools also make it easier
for data breaches to occur in government departments or private
companies/organisations. In simple terms, a data breach is where private
information is illegally obtained or disclosed. Find and summarise ONE resource that
describes ONE example of a data breach that has occurred since the beginning of
2017. The resource, and your summary, should focus purely on A SINGLE EXAMPLE
of a data breach.
Document Page
I C T s e r v i c e m a n a g e m e n t P a g e | 11
Title: 2017 Data Breaches.
Reference: Daitch, H., 2017. 2017 Data Breaches. Available at:
https://www.identityforce.com/blog/2017-data-breaches
Data breach is defined as the illegal way of disclosing personal information. In the
year 2017, 17th February, a similar case of Data Breach was found which was
assumed to be one of the worst breach that took place in the beginning of the year.
The breach took place in the company named “Arby’s”. Arby is known as the
national fast food chain which got involved in data breach after being pressed by the
website Krebsonsecurity. The company were informed at the beginning of the year
i.e. in the month of January about the miss happenings in chosen restaurants but the
FBI inquired the company not to disclose this news in front if public.
Malware were located on the systems of payment mode which were located inside
the corporate stores of Arby. The corporate stores of Arby comprise of one third of
the total Arby’s in the nation. It is assumed that there are nearly 1000 corporate
stores controlled by Arby’s but not all of them were affected. Thus, the actual
amount of stores affected were not actually disclosed. Later on, it was announced by
the company that the malware that took place was removed but the area of the
breach is not known till then. Arby’s denied to disclose the actual time when the
breach took place but an individual credit union thinks that the actual breach took
place in between October 25, 2016 and January 19, 2017 (Daitch, 2017).
Week 9
Agile development is an iterative and incremental approach to delivering systems - it
is particularly useful where the requirements are unclear or evolving. Scrum is a
framework for undertaking agile development. Find and summarise ONE resource
that describes Scrum. The resource, and your summary, should focus purely on
chevron_up_icon
1 out of 15
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]