COIT20246 Assignment Submission: Data Storage, Networks, and Security
VerifiedAdded on  2022/11/13
|12
|4074
|226
Homework Assignment
AI Summary
This assignment solution for COIT20246 presents summaries of various technological topics. Week 1 focuses on NAS storage, with a summary of a resource comparing NAS devices. Week 2 explores the NTFS file system. Week 3 summarizes FTTC technology. Week 4 discusses Tor and its function, while Week 5 details cryptojacking. Week 6 provides an example of a network cable cut impacting business operations. Each summary includes the resource's title and reference, the reason for selection, the main points covered, and the resource's usefulness. The assignment covers a range of topics including data storage, file systems, network infrastructure, and cybersecurity threats and solutions.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

COIT 20246 ASSIGNMENT SUBMISSION
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Please fill in the following details:
Student Name
Student Number
Tutor’s Name
Instructions
It will be necessary to use online resources to complete this assignment, please
ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use
your own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is
a table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Each summary should briefly explain:
- What the resource is about
- Why you selected it
- What are the main points or key information covered in the resource
- Why the resource was useful.
For more advice about how to complete the assignment, as well as examples and
information about selecting good resources, please see the assessment page on the
Moodle unit web site:
https://moodle.cqu.edu.au/mod/assign/view.php?id=886270
1
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Please fill in the following details:
Student Name
Student Number
Tutor’s Name
Instructions
It will be necessary to use online resources to complete this assignment, please
ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use
your own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is
a table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Each summary should briefly explain:
- What the resource is about
- Why you selected it
- What are the main points or key information covered in the resource
- Why the resource was useful.
For more advice about how to complete the assignment, as well as examples and
information about selecting good resources, please see the assessment page on the
Moodle unit web site:
https://moodle.cqu.edu.au/mod/assign/view.php?id=886270
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Week 1
The text discusses examples of traditional mass storage such as magnetic disk and
solid-state drives. While these still underpin most mass storage, in corporate
environments they are often accessed via Network Attached Storage (NAS) or
Storage Area Network (SAN) technologies. Find and summarise ONE resource that
describes EITHER NAS or SAN storage technologies. The resource, and your
summary, must focus on either NAS or SAN, NOT BOTH.
Title and Reference:
The Best Network-Attached Storage for the Home User
Samara Lynn, (2019). The Best Network-Attached Storage For The Home User. [online] Available at:
https://www.forbes.com/sites/wirecutter/2015/07/16/the-best-network-attached-storage-for-the-home-
user/#5ab5b59d25f4 [Accessed 24 May 2019].
Summary:
The resource provided a brief view of the best NAS that should be used by the home
user. As per this resource, QNAP TS-251 is the best NAS for the home user as it has
more memory and faster processor than other NAS. It also consists of the powerful
software which is flexible than other NAS devices.
The reason for choosing this resource is to get information regarding the NAS devices along with the
several drives that are useful in these devices. Another reason is that from this resource, it is clear that
among the various types of NAS devices QNAP TS-251 is best for the home user (Lynn, 2019). Hence
these are the reasons for the selection of this resource.
The key information covered in this resource is the importance of NAS device that
should be used by every home user and the reason for choosing QNAP TS-251 is the
best NAS device. A brief definition of NAS service is provided, which is also key
information of this resource.
The resource was useful because it helps the home users to understand the best NAS devices that must
be suitable for them (Lynn, 2019). In addition, the resources also demonstrate the NAS devices and its
usefulness for the home user, which is also a useful feature of this resource.
Week 2
Operating systems use file managers to interact with mass storage devices.
However, the way in which data is stored and retrieved is dictated by the file system.
There are many types of file systems used by modern operating systems. Find and
summarise ONE resource that describes ONE such file system that is NOT FAT,
FAT32 or ExFAT. The resource, and your summary, must focus on A SINGLE file
system.
Title and Reference:
NTFS file system
Tim Fisher, (2019). The NTFS File System: Everything You Need to Know. [online] Available at:
https://www.lifewire.com/ntfs-file-system-2625948 [Accessed 24 May 2019].
2
The text discusses examples of traditional mass storage such as magnetic disk and
solid-state drives. While these still underpin most mass storage, in corporate
environments they are often accessed via Network Attached Storage (NAS) or
Storage Area Network (SAN) technologies. Find and summarise ONE resource that
describes EITHER NAS or SAN storage technologies. The resource, and your
summary, must focus on either NAS or SAN, NOT BOTH.
Title and Reference:
The Best Network-Attached Storage for the Home User
Samara Lynn, (2019). The Best Network-Attached Storage For The Home User. [online] Available at:
https://www.forbes.com/sites/wirecutter/2015/07/16/the-best-network-attached-storage-for-the-home-
user/#5ab5b59d25f4 [Accessed 24 May 2019].
Summary:
The resource provided a brief view of the best NAS that should be used by the home
user. As per this resource, QNAP TS-251 is the best NAS for the home user as it has
more memory and faster processor than other NAS. It also consists of the powerful
software which is flexible than other NAS devices.
The reason for choosing this resource is to get information regarding the NAS devices along with the
several drives that are useful in these devices. Another reason is that from this resource, it is clear that
among the various types of NAS devices QNAP TS-251 is best for the home user (Lynn, 2019). Hence
these are the reasons for the selection of this resource.
The key information covered in this resource is the importance of NAS device that
should be used by every home user and the reason for choosing QNAP TS-251 is the
best NAS device. A brief definition of NAS service is provided, which is also key
information of this resource.
The resource was useful because it helps the home users to understand the best NAS devices that must
be suitable for them (Lynn, 2019). In addition, the resources also demonstrate the NAS devices and its
usefulness for the home user, which is also a useful feature of this resource.
Week 2
Operating systems use file managers to interact with mass storage devices.
However, the way in which data is stored and retrieved is dictated by the file system.
There are many types of file systems used by modern operating systems. Find and
summarise ONE resource that describes ONE such file system that is NOT FAT,
FAT32 or ExFAT. The resource, and your summary, must focus on A SINGLE file
system.
Title and Reference:
NTFS file system
Tim Fisher, (2019). The NTFS File System: Everything You Need to Know. [online] Available at:
https://www.lifewire.com/ntfs-file-system-2625948 [Accessed 24 May 2019].
2

Summary:
The resource is about the New Technology File System that was discovered by
Microsoft in the year 1993 with the Windows NT 3.1. Release. The resource also
provides information regarding the procedure of using NTFS along with its features
and alternatives.
The reason for selecting this particular resource is that it provides a brief view of this
NTFS that helps the user to use it properly. In addition, another reason is that it not
only demonstrates the file system but also discusses the features of this system.
The main points that are covered in this resource are a description of NTPS, use of this file, and also its
main characteristics (Fisher, 2019). Besides this, another main point is that resource discusses the
alternatives of NTPS that must be useful for the users.
The resource was quite important as it briefly discusses this particular file system, its origin, and how
the hard drive can be formatted by using this NTFS. The features of NTFS also help the user to
understand various attributes of the file system (Fisher, 2019). The NTPS alternative also provides a
view that a user can use FAT and exFAT file system instead of this NTPS. Presence of such aspects
makes the resource useful.
3
The resource is about the New Technology File System that was discovered by
Microsoft in the year 1993 with the Windows NT 3.1. Release. The resource also
provides information regarding the procedure of using NTFS along with its features
and alternatives.
The reason for selecting this particular resource is that it provides a brief view of this
NTFS that helps the user to use it properly. In addition, another reason is that it not
only demonstrates the file system but also discusses the features of this system.
The main points that are covered in this resource are a description of NTPS, use of this file, and also its
main characteristics (Fisher, 2019). Besides this, another main point is that resource discusses the
alternatives of NTPS that must be useful for the users.
The resource was quite important as it briefly discusses this particular file system, its origin, and how
the hard drive can be formatted by using this NTFS. The features of NTFS also help the user to
understand various attributes of the file system (Fisher, 2019). The NTPS alternative also provides a
view that a user can use FAT and exFAT file system instead of this NTPS. Presence of such aspects
makes the resource useful.
3

Week 3
The National Broadband Network (NBN) is currently being rolled-out across Australia
and there is a mix of technologies that are being used to deliver Internet services (for
example, FTTN, FTTC, FTTP, HFC, fixed wireless and satellite). Find and
summarise ONE resource that describes ONE of these delivery technologies. The
resource, and your summary, must focus on A SINGLE technology.
Title and Reference:
Is FTTC enough for the UK's future superfast broadband needs?
Byrne, J., (2019). Is FTTC enough for the UK’s future superfast broadband needs?. [online] Ppc-
online.com. Available at: https://www.ppc-online.com/blog/is-fttc-enough-for-the-uks-future-
superfast-broadband-needs [Accessed 24 May 2019].
Summary:
The resource demonstrates that many countries of the world use Fiber to the Cabinet
(FTTC) or Fiber to the Home (FTTH), but especially the UK uses it for making a
superfast broadband network. In addition, the resource has discussed the broadband
world in 2020 and the role of FFTC in future needs.
The resource has been chosen as it describes the strategy of the UK in using FTTC for making their
broadband superfast among all other countries in the nation (Byrne, 2019). The resource has also
discussed the 2020 broadband aspects in the whole world, and it is also the reason for selecting it.
The key information covered in the resource is the use of FTTC by the UK for
enhancing their broadband speed and also the future broadband network of the nation.
Along with this, it also describes the role of FTTC in the future world.
The resource is useful because it can help the other country government to introduce FTTC in their
broadband network so that they can also enhance their broadband speed in the coming days as like the
UK (Byrne, 2019). It was also useful in understanding the ways that FFTC can improve the broadband
speed of the network.
Week 4
The Internet is made up of many interconnected servers and networks. Users are
increasingly aware and concerned that their Internet communications can be
intercepted and monitored. Tor is one technology that allows users to obscure or
hide online their online activities. Find and summarise ONE resource that describes
what Tor is and how it works. The resource, and your summary, must focus purely on
Tor.
Title and Reference:
Everything about Tor: What is Tor? How Tor Works?
Tiwari, A., (2017). Everything About Tor: What is Tor? How Tor Works ?. [online] Fossbytes.
Available at: https://fossbytes.com/everything-tor-tor-tor-works/ [Accessed 24 May 2019].
4
The National Broadband Network (NBN) is currently being rolled-out across Australia
and there is a mix of technologies that are being used to deliver Internet services (for
example, FTTN, FTTC, FTTP, HFC, fixed wireless and satellite). Find and
summarise ONE resource that describes ONE of these delivery technologies. The
resource, and your summary, must focus on A SINGLE technology.
Title and Reference:
Is FTTC enough for the UK's future superfast broadband needs?
Byrne, J., (2019). Is FTTC enough for the UK’s future superfast broadband needs?. [online] Ppc-
online.com. Available at: https://www.ppc-online.com/blog/is-fttc-enough-for-the-uks-future-
superfast-broadband-needs [Accessed 24 May 2019].
Summary:
The resource demonstrates that many countries of the world use Fiber to the Cabinet
(FTTC) or Fiber to the Home (FTTH), but especially the UK uses it for making a
superfast broadband network. In addition, the resource has discussed the broadband
world in 2020 and the role of FFTC in future needs.
The resource has been chosen as it describes the strategy of the UK in using FTTC for making their
broadband superfast among all other countries in the nation (Byrne, 2019). The resource has also
discussed the 2020 broadband aspects in the whole world, and it is also the reason for selecting it.
The key information covered in the resource is the use of FTTC by the UK for
enhancing their broadband speed and also the future broadband network of the nation.
Along with this, it also describes the role of FTTC in the future world.
The resource is useful because it can help the other country government to introduce FTTC in their
broadband network so that they can also enhance their broadband speed in the coming days as like the
UK (Byrne, 2019). It was also useful in understanding the ways that FFTC can improve the broadband
speed of the network.
Week 4
The Internet is made up of many interconnected servers and networks. Users are
increasingly aware and concerned that their Internet communications can be
intercepted and monitored. Tor is one technology that allows users to obscure or
hide online their online activities. Find and summarise ONE resource that describes
what Tor is and how it works. The resource, and your summary, must focus purely on
Tor.
Title and Reference:
Everything about Tor: What is Tor? How Tor Works?
Tiwari, A., (2017). Everything About Tor: What is Tor? How Tor Works ?. [online] Fossbytes.
Available at: https://fossbytes.com/everything-tor-tor-tor-works/ [Accessed 24 May 2019].
4
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Summary:
The resource describes Tor or the Onion Router that reduces the traffic and network spying. In
addition, history, along with its working procedure, has also briefly discussed in this context. The
resource has also discussed the influence, controversies, safeties, and downloading procedure of Tor
(Tiwari, 2017).
The resource is chosen because it provides a brief description of Tor that can help the
user to understand its working procedure appropriately. Another reason for selecting
this context is to know the history of Tor along with the safety procedure that should
be needed by a user while using it.
The main point that covered in this resource is the definition of Tor, its history,
working, and safety procedure that enables a user to use it properly. Other information
is the influence, controversies, downloading process of Tor, and its alternatives.
The paper was useful because it allows the user to get an opinion regarding Tor along with its various
function (Tiwari, 2017). It also helps the users that they can also use their alternatives according to
their choice. The resource is also useful to know the safety process of Tor and ways of downloading
Tor for the devices by the users.
5
The resource describes Tor or the Onion Router that reduces the traffic and network spying. In
addition, history, along with its working procedure, has also briefly discussed in this context. The
resource has also discussed the influence, controversies, safeties, and downloading procedure of Tor
(Tiwari, 2017).
The resource is chosen because it provides a brief description of Tor that can help the
user to understand its working procedure appropriately. Another reason for selecting
this context is to know the history of Tor along with the safety procedure that should
be needed by a user while using it.
The main point that covered in this resource is the definition of Tor, its history,
working, and safety procedure that enables a user to use it properly. Other information
is the influence, controversies, downloading process of Tor, and its alternatives.
The paper was useful because it allows the user to get an opinion regarding Tor along with its various
function (Tiwari, 2017). It also helps the users that they can also use their alternatives according to
their choice. The resource is also useful to know the safety process of Tor and ways of downloading
Tor for the devices by the users.
5

Week 5
An emerging form of malware is cryptojacking (also known as malicious
cryptomining). Find and summarise ONE resource that describes what cryptojacking
is and how it works. The resource, and your summary, should focus purely on
cryptojacking and NO OTHER form(s) of malware.
Title and Reference:
What is cryptojacking? How to prevent, detect, and recover from it?
Nadeau, M., (2019). What is cryptojacking? How to prevent, detect, and recover from it. [online] CSO
Online. Available at: https://www.csoonline.com/article/3253572/what-is-cryptojacking-how-to-
prevent-detect-and-recover-from-it.html [Accessed 25 May 2019].
Summary:
The paper describes cryptojacking, which is a malicious link that generally used by
hackers. The reassure has also discussed the reason for rising this cryptojacking and
also it's working procedure. Besides this, it also provides some examples of
cryptojacking occurring in the current world.
The resource has been selected for understanding about cryptojacking and its working role so that one
can prevent and detect the devices from this malware link (Nadeau, 2019). It is also chosen because it
demonstrates the cause of cryptocurrency in today's world environment, and it has been described.
The key information related to the resource is it discusses the cryptojacking process, its cause, and also
it working prospects. All the features of cryptojacking have been described with real-world examples
that help the user to understand the various ways by which they can prevent this malicious link to be
spread in their devices (Nadeau, 2019).
The resource was useful because it only discusses the cryptojacking procedure but
also enables the user to protect, detect, and recover the data from this malicious
attack. In other words, it also useful for understanding its working procedure, which
thus helps the users to take preventive measures that help them to reduce this
malicious attack.
Week 6
Redundancy is a critical aspect of network design, implemented in order to cope link
or equipment failure. One frequent cause of failure is damage to fibre optic cables
that connect countries and/or continents. Find and summarise ONE resource that
describes ONE example of such a cable being cut or damaged. The resource, and
your summary, should describe the impacts of A SINGLE EXAMPLE of a link failure.
Note that the failure must relate to a link that connects countries and/or continents.
Title and Reference:
Outages following cut Telstra cable set to roll into the weekend
Duckett, C., (2019). Outages following cut Telstra cable set to roll into weekend | ZDNet. [online]
ZDNet. Available at: https://www.zdnet.com/article/outages-following-cut-telstra-cable-set-to-roll-
6
An emerging form of malware is cryptojacking (also known as malicious
cryptomining). Find and summarise ONE resource that describes what cryptojacking
is and how it works. The resource, and your summary, should focus purely on
cryptojacking and NO OTHER form(s) of malware.
Title and Reference:
What is cryptojacking? How to prevent, detect, and recover from it?
Nadeau, M., (2019). What is cryptojacking? How to prevent, detect, and recover from it. [online] CSO
Online. Available at: https://www.csoonline.com/article/3253572/what-is-cryptojacking-how-to-
prevent-detect-and-recover-from-it.html [Accessed 25 May 2019].
Summary:
The paper describes cryptojacking, which is a malicious link that generally used by
hackers. The reassure has also discussed the reason for rising this cryptojacking and
also it's working procedure. Besides this, it also provides some examples of
cryptojacking occurring in the current world.
The resource has been selected for understanding about cryptojacking and its working role so that one
can prevent and detect the devices from this malware link (Nadeau, 2019). It is also chosen because it
demonstrates the cause of cryptocurrency in today's world environment, and it has been described.
The key information related to the resource is it discusses the cryptojacking process, its cause, and also
it working prospects. All the features of cryptojacking have been described with real-world examples
that help the user to understand the various ways by which they can prevent this malicious link to be
spread in their devices (Nadeau, 2019).
The resource was useful because it only discusses the cryptojacking procedure but
also enables the user to protect, detect, and recover the data from this malicious
attack. In other words, it also useful for understanding its working procedure, which
thus helps the users to take preventive measures that help them to reduce this
malicious attack.
Week 6
Redundancy is a critical aspect of network design, implemented in order to cope link
or equipment failure. One frequent cause of failure is damage to fibre optic cables
that connect countries and/or continents. Find and summarise ONE resource that
describes ONE example of such a cable being cut or damaged. The resource, and
your summary, should describe the impacts of A SINGLE EXAMPLE of a link failure.
Note that the failure must relate to a link that connects countries and/or continents.
Title and Reference:
Outages following cut Telstra cable set to roll into the weekend
Duckett, C., (2019). Outages following cut Telstra cable set to roll into weekend | ZDNet. [online]
ZDNet. Available at: https://www.zdnet.com/article/outages-following-cut-telstra-cable-set-to-roll-
6

into-weekend/ [Accessed 24 May 2019].
Summary:
The resource provides an example of a cable being cut from the business operations
by affecting the company. The example of Telstra is provided in this resource, which
shows that this firm faces cable cut down in their several service station. However,
they repair their optic fiber cables by the third party to overcome the situation.
The paper has been selected because it provides the reason for cable cut by Telstra and also the way of
managing the services of cable cut by third party members (Duckett, 2019). Another reason for
selecting this resource is to understand the way by which Telstra investigate and repair their cable cut
service.
The main points that have been discussed in this resource are the cause of cable being
cut in Telstra services and also it repairing technique by the third party broadband
services. Another critical information is that the investigation procedure of this cable
cut has also been described in this context.
The resource was useful because it helps another company to be aware of the cable cut, and they can
take effective measures for reducing this problem in their business. Proper investigation technique was
also useful for other firms to know the reason for any cable cut occurring in the business (Duckett,
2019).
7
Summary:
The resource provides an example of a cable being cut from the business operations
by affecting the company. The example of Telstra is provided in this resource, which
shows that this firm faces cable cut down in their several service station. However,
they repair their optic fiber cables by the third party to overcome the situation.
The paper has been selected because it provides the reason for cable cut by Telstra and also the way of
managing the services of cable cut by third party members (Duckett, 2019). Another reason for
selecting this resource is to understand the way by which Telstra investigate and repair their cable cut
service.
The main points that have been discussed in this resource are the cause of cable being
cut in Telstra services and also it repairing technique by the third party broadband
services. Another critical information is that the investigation procedure of this cable
cut has also been described in this context.
The resource was useful because it helps another company to be aware of the cable cut, and they can
take effective measures for reducing this problem in their business. Proper investigation technique was
also useful for other firms to know the reason for any cable cut occurring in the business (Duckett,
2019).
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Week 7
Since the 1990s, Enterprise Systems (also known as Enterprise Resource Planning
systems) have become critical to the operation modern organisations. Over this
time, ES/ERPs have evolved and continue to change in response to new demands
and emerging technologies. Find and summarise ONE resource that discusses
emerging or future trends for ES/ERPs. The resource should be recent (published
since the beginning of 2017) and it and your summary should clearly identify how
ES/ERPs are, or are about to, change.
Title and Reference:
ERP Software Trends: What You Should Know for 2019
Kim O’Shaughnessy, (2019). ERP Software Trends: What You Should Know for 2019. [online]
Available at: https://selecthub.com/enterprise-resource-planning/erp-software-trends/ [Accessed 25
May 2019].
Summary:
The resource discusses the ERP software system that must be used by every company
for taking correct financial decision. The key takeaways, along with its involvement
with cloud services, have also been demonstrated in this resource. The context
provides the overall trend of ERP until the year 2019 (O’Shaughnessy, 2019).
The ERP software system is an important feature of cloud computing that
automatically upgraded to provide personalized solutions that should be beneficial for
the firm. Apart from this, it provides flexibility by shortening the disruption cycle,
and these are the reasons for selecting this resource.
The advantages of cloud-based ERP and its working trends in the current world environment are the
main key information describes in this resource. Besides this, the upgradation procedure and advanced
technological methods of ERP are also the main points covered in this context (O’Shaughnessy, 2019).
The resource was important because it provides the current trends of ERP in the cloud
system and also its benefits in the business procedure. In other words, it was also
useful for the business researchers to understand the several manners by which they
can advance the ERP technology and upgrade it as per the current business
environment.
Week 8
Databases, mass data storage and interrogation technologies underpin virtually all
Information Systems and applications. However, the same tools also make it easier
for data breaches to occur in government departments or private
companies/organisations. In simple terms, a data breach is where private
information is illegally obtained or disclosed. Find and summarise ONE resource that
describes ONE example of a data breach that has occurred since the beginning of
2017. The resource, and your summary, should focus purely on A SINGLE
EXAMPLE of a data breach.
8
Since the 1990s, Enterprise Systems (also known as Enterprise Resource Planning
systems) have become critical to the operation modern organisations. Over this
time, ES/ERPs have evolved and continue to change in response to new demands
and emerging technologies. Find and summarise ONE resource that discusses
emerging or future trends for ES/ERPs. The resource should be recent (published
since the beginning of 2017) and it and your summary should clearly identify how
ES/ERPs are, or are about to, change.
Title and Reference:
ERP Software Trends: What You Should Know for 2019
Kim O’Shaughnessy, (2019). ERP Software Trends: What You Should Know for 2019. [online]
Available at: https://selecthub.com/enterprise-resource-planning/erp-software-trends/ [Accessed 25
May 2019].
Summary:
The resource discusses the ERP software system that must be used by every company
for taking correct financial decision. The key takeaways, along with its involvement
with cloud services, have also been demonstrated in this resource. The context
provides the overall trend of ERP until the year 2019 (O’Shaughnessy, 2019).
The ERP software system is an important feature of cloud computing that
automatically upgraded to provide personalized solutions that should be beneficial for
the firm. Apart from this, it provides flexibility by shortening the disruption cycle,
and these are the reasons for selecting this resource.
The advantages of cloud-based ERP and its working trends in the current world environment are the
main key information describes in this resource. Besides this, the upgradation procedure and advanced
technological methods of ERP are also the main points covered in this context (O’Shaughnessy, 2019).
The resource was important because it provides the current trends of ERP in the cloud
system and also its benefits in the business procedure. In other words, it was also
useful for the business researchers to understand the several manners by which they
can advance the ERP technology and upgrade it as per the current business
environment.
Week 8
Databases, mass data storage and interrogation technologies underpin virtually all
Information Systems and applications. However, the same tools also make it easier
for data breaches to occur in government departments or private
companies/organisations. In simple terms, a data breach is where private
information is illegally obtained or disclosed. Find and summarise ONE resource that
describes ONE example of a data breach that has occurred since the beginning of
2017. The resource, and your summary, should focus purely on A SINGLE
EXAMPLE of a data breach.
8

Title and Reference:
Facebook Security Breach Exposes Accounts of 50 Million Users
Mike Isaac and Sheera Frenkel (2019). Facebook Security Breach Exposes Accounts of 50 Million
Users. [online] Available at: https://www.nytimes.com/2018/09/28/technology/facebook-hack-data-
breach.html [Accessed 25 May 2019].
Summary:
The resource has described the data breaching activities that occurred at the beginning
of 2017 by Facebook. As per the paper, the hackers attacked the computer networks
of Facebook and exposed the personal information of about 50 million users. The
resource briefly demonstrates the data breaching activities that took place within this
firm.
The motive of choosing this resource is to understand the cause of these data breaching activities of
Facebook. Besides this, the context describes the preventive measures that had been taken by the top
executives Sheryl Sandberg and Mark Zuckerberg for overcoming this data breaches (Isaac and
Frenkel, 2019).
The main points that have been discussed in this resource are the cause of the data
breaches that affected the common people and the appropriate preventive measures
needed by the senior executives of Facebook. Another key information is that the
effect of software bugs can generate data breaches in a firm.
The resource was useful for other social networking service company to identify the several features
that can cause data breach in their business (Isaac and Frenkel, 2019). With the help of this
information, the other companies can take preventive measure by which they reduce the activity of data
breach of their business in the coming days.
9
Facebook Security Breach Exposes Accounts of 50 Million Users
Mike Isaac and Sheera Frenkel (2019). Facebook Security Breach Exposes Accounts of 50 Million
Users. [online] Available at: https://www.nytimes.com/2018/09/28/technology/facebook-hack-data-
breach.html [Accessed 25 May 2019].
Summary:
The resource has described the data breaching activities that occurred at the beginning
of 2017 by Facebook. As per the paper, the hackers attacked the computer networks
of Facebook and exposed the personal information of about 50 million users. The
resource briefly demonstrates the data breaching activities that took place within this
firm.
The motive of choosing this resource is to understand the cause of these data breaching activities of
Facebook. Besides this, the context describes the preventive measures that had been taken by the top
executives Sheryl Sandberg and Mark Zuckerberg for overcoming this data breaches (Isaac and
Frenkel, 2019).
The main points that have been discussed in this resource are the cause of the data
breaches that affected the common people and the appropriate preventive measures
needed by the senior executives of Facebook. Another key information is that the
effect of software bugs can generate data breaches in a firm.
The resource was useful for other social networking service company to identify the several features
that can cause data breach in their business (Isaac and Frenkel, 2019). With the help of this
information, the other companies can take preventive measure by which they reduce the activity of data
breach of their business in the coming days.
9

Week 9
Agile development is an iterative and incremental approach to delivering systems - it
is particularly useful where the requirements are unclear or evolving. Scrum is a
framework for undertaking agile development. Find and summarise ONE resource
that describes Scrum. The resource, and your summary, should focus purely on
Scrum and discuss some of its key features and attributes.
Title and Reference:
Scrum Characteristics
Scrumversity.org. (2019). Scrum Characteristics- SCRUMVersity. [online] Available at:
https://www.scrumversity.org/scrum-characteristics [Accessed 25 May 2019].
Summary:
The resource describes scrum along with its characteristics and key features. Besides
this, the context discusses that this agile based process is used for controlling and
managing software of business. Apart from this, the attributes of scrum have also
been discussed in this resource.
The paper provides a brief opinion regarding the scrum process and its characteristics that should be
beneficial for any firm. Another reason for choosing this resource is to identify the several attributes
and usefulness of this scrum process in a business (Scrumversity.org, 2019).
The main points that have covered in this resource are the ways of using this agile-
based resource, its characteristics, and the role of Scrum teams in an organization. In
other words, the resource has also demonstrated that collaboration, empowerment,
and diverse skills are the responsibilities of the scrum teams.
The resource was useful to identify the various attributes of this agile-based process that can help the
user to use it properly in their business function (Scrumversity.org, 2019). Apart from this, another
useful quality of the resource is that it helps the scrum teams to know the various ways by which they
can identify their work role and also improve it as per their business needs.
Week 10
The textbook discusses activities associated with project management. However, it
could be argued that project governance is equally important, especially in very large
projects. Find and summarise ONE resource that describes what project governance
is and what activities it entails. The resource, and your summary, should focus purely
on project governance.
Title and Reference:
Project Governance Roles and Responsibilities
Linman, D., Linman, D., McConnell, E., and McConnell, E. (2011). Project Governance Roles and
Responsibilities. [online] Mymanagementguide.com. Available at:
https://mymanagementguide.com/project-governance-roles-and-responsibilities/ [Accessed 25 May
2019].
10
Agile development is an iterative and incremental approach to delivering systems - it
is particularly useful where the requirements are unclear or evolving. Scrum is a
framework for undertaking agile development. Find and summarise ONE resource
that describes Scrum. The resource, and your summary, should focus purely on
Scrum and discuss some of its key features and attributes.
Title and Reference:
Scrum Characteristics
Scrumversity.org. (2019). Scrum Characteristics- SCRUMVersity. [online] Available at:
https://www.scrumversity.org/scrum-characteristics [Accessed 25 May 2019].
Summary:
The resource describes scrum along with its characteristics and key features. Besides
this, the context discusses that this agile based process is used for controlling and
managing software of business. Apart from this, the attributes of scrum have also
been discussed in this resource.
The paper provides a brief opinion regarding the scrum process and its characteristics that should be
beneficial for any firm. Another reason for choosing this resource is to identify the several attributes
and usefulness of this scrum process in a business (Scrumversity.org, 2019).
The main points that have covered in this resource are the ways of using this agile-
based resource, its characteristics, and the role of Scrum teams in an organization. In
other words, the resource has also demonstrated that collaboration, empowerment,
and diverse skills are the responsibilities of the scrum teams.
The resource was useful to identify the various attributes of this agile-based process that can help the
user to use it properly in their business function (Scrumversity.org, 2019). Apart from this, another
useful quality of the resource is that it helps the scrum teams to know the various ways by which they
can identify their work role and also improve it as per their business needs.
Week 10
The textbook discusses activities associated with project management. However, it
could be argued that project governance is equally important, especially in very large
projects. Find and summarise ONE resource that describes what project governance
is and what activities it entails. The resource, and your summary, should focus purely
on project governance.
Title and Reference:
Project Governance Roles and Responsibilities
Linman, D., Linman, D., McConnell, E., and McConnell, E. (2011). Project Governance Roles and
Responsibilities. [online] Mymanagementguide.com. Available at:
https://mymanagementguide.com/project-governance-roles-and-responsibilities/ [Accessed 25 May
2019].
10
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Summary:
The resource is about the project governance roles as well as responsibilities. It
demonstrated that project governance roles are to provide government mechanism
that should ensure compliance with appropriate implementation standards. The
resource has also discussed the roles of three types of project governance in a firm.
The resource is selected because it helps in understanding the responsibilities and roles of the three
types of project governance such as an executive sponsor, project manager or director, and steering
committee (Linman et al., 2019). All these job positions have different roles in the project governance
system.
The key information that has covered in this paper are mainly the responsibilities and
roles of three different types of project governance of a company. With the help of
this information, it is quite evident that the roles of this project governance are
variable from each other.
The resource was useful because it helps the readers to understand the roles of various types of project
governance of a firm with the help of a flowchart. In addition, it is also useful for the effective sponsor,
steering committee as well as the project director or manager to improve their working procedure in
making a future project of the organization where they are working (Linman et al., 2019).
11
The resource is about the project governance roles as well as responsibilities. It
demonstrated that project governance roles are to provide government mechanism
that should ensure compliance with appropriate implementation standards. The
resource has also discussed the roles of three types of project governance in a firm.
The resource is selected because it helps in understanding the responsibilities and roles of the three
types of project governance such as an executive sponsor, project manager or director, and steering
committee (Linman et al., 2019). All these job positions have different roles in the project governance
system.
The key information that has covered in this paper are mainly the responsibilities and
roles of three different types of project governance of a company. With the help of
this information, it is quite evident that the roles of this project governance are
variable from each other.
The resource was useful because it helps the readers to understand the roles of various types of project
governance of a firm with the help of a flowchart. In addition, it is also useful for the effective sponsor,
steering committee as well as the project director or manager to improve their working procedure in
making a future project of the organization where they are working (Linman et al., 2019).
11

MARKING SHEET - DO NOT DELETE
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the
task; summary fails to explain what the resource was about; the relevance
and/or usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent, but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot
be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content/contains content not contained in the resource) OR
Multiple resources used for a single task
Resource is generic AND/OR covers multiple technologies/examples
rather than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
12
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the
task; summary fails to explain what the resource was about; the relevance
and/or usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent, but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot
be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content/contains content not contained in the resource) OR
Multiple resources used for a single task
Resource is generic AND/OR covers multiple technologies/examples
rather than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
12
1 out of 12
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.