University CIS Assignment: 3D Printing, Cloud, Security, Networks

Verified

Added on  2022/09/18

|6
|1065
|30
Homework Assignment
AI Summary
This Computer Information Systems assignment addresses four key areas. Firstly, it defines 3D printing, its additive processes, and current trends. Secondly, it explains cloud computing, its various types (SaaS, PaaS, IaaS), and how organizations utilize it for storage and scalability. The third section details three security threats: botnet attacks, drive-by download attacks, and phishing attacks, alongside preventive measures. Finally, it defines computer networks and details various network types such as LAN, CAN, WAN, MAN, and HAN, providing a comprehensive overview of each.
Document Page
Running head: COMPUTER IS
Computer Information System
Name of the Student
Name of the University
Author’s Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1COMPUTER IS
Question 1
3D printing
3D printing is a method of producing solid three-dimensional objects from the digital
image. A 3D printing model is produced using the additive processes (Duda and Raghavan
2016). Any object is formed in the additive process by spreading out successive layers of
the material before the object is produced. One can see each of the layers as the finely sliced
horizontally cross-section of the ultimate piece. 3D printing is the alternative of the subtractive
processing, in which the piece of metal or plastic, for instance, any milling machine is hollowed
out or cutting out 3D printing allows dynamic objects to be created with fewer resources than
conventional production processes.
Trends
The landscape in the 3D printing will become ever more complex.
There is a broader variety of different technologies on the market for use.
Expect further choices for 3D printers and products made from high-temperature
filament.
Composite 3D printing is about to reach a stage of development.
The development of 3D printing technologies will greatly accelerate
Automation post-processing takes center stage.
The high-volume 3D printing is going to become a reality
Question 2
Cloud Computing
Document Page
2COMPUTER IS
Cloud technology enables the IT tools to be scalable to store vast datasets, build and
manage dynamic software, and extend on-demand computing capacity and other services.
Reducing or eliminating the large-scale technology and technological projects, combined with
the pay-per-use model, greatly reduces the IT costs. Cloud computing allows the network ability
to be instantly flexible based on the company needs (Stergiou et al. 2018). Cloud empowers
the businesses to distribute their apps globally so that they can support their clients at a fraction
of a typical business’s expense. It is a significant task to secure important, publicly identifying,
and financial information. Nevertheless, sophisticated cloud security technology reduced the
chance of information leakage and cyber surveillance.
Types of Cloud Computing
The most growing and commonly embraced services in cloud computing are:
Software as a Service (SaaS)
Platform as a Service (PaaS)
Infrastructure as a Service (IaaS)
Use of Cloud Computing
There are multiple ways of using the cloud technology such as:
Cloud computing can be used as storage platform. The organizations can store almost any
form of file on the cloud, as well as private storage providers can be made extremely secure if
the organizations need restricted access to the data (Rittinghouse and Ransome 2016).
Question 3
Three types of security threats are:
Document Page
3COMPUTER IS
Botnet attack
Drive-by download attack
Phishing attack
For preventing these attack the followings aspects can be done.
Botnet attack prevention: Organizations have many ways to avoid botnet infections:
Track network output and operation to detect any unusual network behavior
Keep the operating system up-to-date
Maintain all applications up-to-date and deploy the required security patches (Hoque,
Bhattacharyya and Kalita 2015)
Warn users not to participate in any action that puts them at risk for the botnet threat or
the other malware, like email as well as message opening
Drive-by download attack prevention: One of the safest ways the company can avoid drive-by-
download attacks is to periodically upgrade and patch systems along with the new applications,
programs, browsers, as well as operating systems models (Jayasinghe, Culpepper and Bertok
2014). Often warn users for staying away from vulnerable websites. Security device deployment
that regularly monitors websites will help secure endpoints from the drive-by-downloads.
Phishing attack prevention: The organizations should educate users or the employees not to
open attachments as well as click on the email links from unauthorized senders and prevent free
software access from the untrusted websites.
Question 4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4COMPUTER IS
A network is characterized as a group of multiple computers, which are interlinked
systems. If the process in one system will share information with the process in another
computer, two machines are in network. The networks are known as the network for node or
computer communications (Pawar and Anuradha 2015). A network is included with the
collection of computers, computer systems as well as linking networking equipment to exchange
services, including printer or the file server. Several types of wireless networks are there such as:
Local area networks (LAN): Systems are connected together physically, which are in the
same building.
Campus-area networks (CAN): Systems operate within a small geographical range, such
as a site or the military base.
Wide Area Networks (WAN): Machines are more remote and connected by radio devices
or telephones.
Metropolitan Area networks (MAN): The data network planned for the city or area.
Home Area Networks (HAN): Any network inside a user’s home, which links digital
devices to an individual.
Document Page
5COMPUTER IS
References
Duda, T. and Raghavan, L.V., 2016. 3D metal printing technology. IFAC-PapersOnLine, 49(29),
pp.103-110.
Hoque, N., Bhattacharyya, D.K. and Kalita, J.K., 2015. Botnet in DDoS attacks: trends and
challenges. IEEE Communications Surveys & Tutorials, 17(4), pp.2242-2270.
Jayasinghe, G.K., Culpepper, J.S. and Bertok, P., 2014. Efficient and effective realtime
prediction of drive-by download attacks. Journal of Network and Computer Applications, 38,
pp.135-149.
Pawar, M.V. and Anuradha, J., 2015. Network security and types of attacks in
network. Procedia Computer Science, 48, pp.503-506.
Rittinghouse, J.W. and Ransome, J.F., 2016. Cloud computing: implementation, management,
and security. CRC press.
Stergiou, C., Psannis, K.E., Kim, B.G. and Gupta, B., 2018. Secure integration of IoT and cloud
computing. Future Generation Computer Systems, 78, pp.964-975.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]