COIT 20246: IT Write Up - ICT Services Management Assignment Details
VerifiedAdded on  2022/11/14
|15
|4228
|150
Homework Assignment
AI Summary
This IT Write Up assignment, completed by a student, explores various aspects of ICT Services Management across seven weeks. The assignment delves into network technologies, starting with an analysis of Network Attached Storage (NAS) and its features. It then progresses to file systems, focusing on the NTFS file system and its security aspects. The assignment further examines the National Broadband Network (NBN) in Australia, specifically the Fiber to the Node (FTTN) technology. Following this, the assignment investigates Tor technology and its role in online anonymity. It also addresses the emerging threat of cryptojacking, explaining its mechanisms and prevention. The assignment also includes a real-world example of a fiber optic cable cut and its impact on network redundancy, and finally, the assignment explores emerging trends in Enterprise Resource Planning (ERP) systems. Each week's task involves summarizing a resource, providing insights into the selected technology or concept, and explaining its significance.

Running Head: IT Write Up 0
IT Write Up
ICT Services Management
Kieren Jamieson
5/21/2019
IT Write Up
ICT Services Management
Kieren Jamieson
5/21/2019
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

ICT Services Management
Week 1
The text discusses examples of traditional mass storage such as magnetic disk and
solid-state drives. While these still underpin most mass storage, in corporate
environments they are often accessed via Network Attached Storage (NAS) or
Storage Area Network (SAN) technologies. Find and summarise ONE resource that
describes EITHER NAS or SAN storage technologies. The resource, and your
summary, must focus on either NAS or SAN, NOT BOTH.
Network Attached Storage:
Liu, C. & Chen, H., 2009. Network Attached Storage. U.S. Patent Application, 29(250), p.435.
Summary:
The author in this article explained network attached storage technologies in detail.
In this context, NAS is a file-level data storage device that is attached to a TCP/IP
network, or we can say Ethernet. Besides, NAS typically utilises CIFS or NFS
protocols, while choices such as HTTP is available. In addition, NAS is like an
operating system being a shared folder from which employee access data files
through the NAS exactly like they do access any other file over the network. On the
other hand, the article highlighted NAS as LAN-dependent; hence whenever the LAN
goes down then the NAS also goes down (Liu & Chen, 2009). In addition to that, this
study suggested that NAS is not as quick as block-based SAN, yet high-speed LANs
can be used to overcome almost all performance as well as latency issues.
Apart from this, the article written by (Liu & Chen, 2009) highlighted the key
differences among SAN and NAS as data processing, fabric, protocols, performance,
scalability, price, and ease of management are the base factors which distinguish the
NAS from other attached storage technologies. In this way, this resource on NAS
provided the details of the usability of NAS over other storage technologies while
highlighting its differentiating features.
Week 2
Operating systems use file managers to interact with mass storage devices.
However, the way in which data is stored and retrieved is dictated by the file system.
1
Week 1
The text discusses examples of traditional mass storage such as magnetic disk and
solid-state drives. While these still underpin most mass storage, in corporate
environments they are often accessed via Network Attached Storage (NAS) or
Storage Area Network (SAN) technologies. Find and summarise ONE resource that
describes EITHER NAS or SAN storage technologies. The resource, and your
summary, must focus on either NAS or SAN, NOT BOTH.
Network Attached Storage:
Liu, C. & Chen, H., 2009. Network Attached Storage. U.S. Patent Application, 29(250), p.435.
Summary:
The author in this article explained network attached storage technologies in detail.
In this context, NAS is a file-level data storage device that is attached to a TCP/IP
network, or we can say Ethernet. Besides, NAS typically utilises CIFS or NFS
protocols, while choices such as HTTP is available. In addition, NAS is like an
operating system being a shared folder from which employee access data files
through the NAS exactly like they do access any other file over the network. On the
other hand, the article highlighted NAS as LAN-dependent; hence whenever the LAN
goes down then the NAS also goes down (Liu & Chen, 2009). In addition to that, this
study suggested that NAS is not as quick as block-based SAN, yet high-speed LANs
can be used to overcome almost all performance as well as latency issues.
Apart from this, the article written by (Liu & Chen, 2009) highlighted the key
differences among SAN and NAS as data processing, fabric, protocols, performance,
scalability, price, and ease of management are the base factors which distinguish the
NAS from other attached storage technologies. In this way, this resource on NAS
provided the details of the usability of NAS over other storage technologies while
highlighting its differentiating features.
Week 2
Operating systems use file managers to interact with mass storage devices.
However, the way in which data is stored and retrieved is dictated by the file system.
1

There are many types of file systems used by modern operating systems. Find and
summarise ONE resource that describes ONE such file system that is NOT FAT,
FAT32 or ExFAT. The resource, and your summary, must focus on A SINGLE file
system.
Analysis and implementation of NTFS file system based on computer forensics :
Kai, Z., En, C. & Qinquan, G., 2010. Analysis and implementation of NTFS file system based on
computer forensics. Second International Workshop on Educational Technology and Computer
Science, 1, pp.325-28.
Summary:
The chosen article is all about NTFS file system which is based on computer
forensics. In this context, author of this research paper explained NTFS file system
as the New Technology File System while covering the main features of this type of
file system in operating system. With the help of studying this article’s findings it has
been found that files name in NTFS system can be up to 255 characters which are
not case sensitive (Kai et al., 2010). In addition to that, the study highlighted that file
names of NTFS file system may contain most of the characters except / “> < * | :.
Apart from this, the author explained NTFS system as a secure system for keeping
files and folders secure. This study suggested that data in the form of folders and
files are safer than that of FAT file system. Moreover, data security in NTFS system
is usually maintained through assigning NTFS permissions to data folders and files.
Data security is typically maintained at the network as well as local level (Kai et al.,
2010).
In this way, this research on NTFS file system has covered useful information
including naming conventions, partition size, security, high reliability, file
compression, as well as bad cluster mapping problem.
2
summarise ONE resource that describes ONE such file system that is NOT FAT,
FAT32 or ExFAT. The resource, and your summary, must focus on A SINGLE file
system.
Analysis and implementation of NTFS file system based on computer forensics :
Kai, Z., En, C. & Qinquan, G., 2010. Analysis and implementation of NTFS file system based on
computer forensics. Second International Workshop on Educational Technology and Computer
Science, 1, pp.325-28.
Summary:
The chosen article is all about NTFS file system which is based on computer
forensics. In this context, author of this research paper explained NTFS file system
as the New Technology File System while covering the main features of this type of
file system in operating system. With the help of studying this article’s findings it has
been found that files name in NTFS system can be up to 255 characters which are
not case sensitive (Kai et al., 2010). In addition to that, the study highlighted that file
names of NTFS file system may contain most of the characters except / “> < * | :.
Apart from this, the author explained NTFS system as a secure system for keeping
files and folders secure. This study suggested that data in the form of folders and
files are safer than that of FAT file system. Moreover, data security in NTFS system
is usually maintained through assigning NTFS permissions to data folders and files.
Data security is typically maintained at the network as well as local level (Kai et al.,
2010).
In this way, this research on NTFS file system has covered useful information
including naming conventions, partition size, security, high reliability, file
compression, as well as bad cluster mapping problem.
2
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Week 3
The National Broadband Network (NBN) is currently being rolled-out across Australia
and there is a mix of technologies that are being used to deliver Internet services (for
example, FTTN, FTTC, FTTP, HFC, fixed wireless and satellite). Find and
summarise ONE resource that describes ONE of these delivery technologies. The
resource, and your summary, must focus on A SINGLE technology.
Broadband policy and rural and cultural divides in Australia:
Ewing, S., Rennie, E. & Thomas, J., 2015. Broadband policy and rural and cultural divides in Australia.
Digital divides : The new challenges and opportunities of e-inclusion, pp.107-24.
Summary:
As per the article written by (Ewing et al., 2015), FTTN is known as Fiber to the node
and it is one of the options for offering broadband telecommunications services for
multiple destinations. Besides, FTTN assists to provide broadband connection along
with the other data services from using a common network box that is called a node.
The paper has also suggested that FTTN is often called as fiber to the
neighbourhood. In other words, it has been found that FTTN serves a hundred
customers hence they must be present in a miles radius. In addition, the article
analysis suggests that consumer proximity to the nodes as well as delivery protocols
defines data rates. Moreover, both the FTTN and FTTC provide fiber optic Internet to
many of the Australian consumers at comparatively less expenses (Ewing et al.,
2015).
Apart from this, the chosen study has also covered one of the major benefits of FTTN
as well as similar systems as it has the ability of delivering data across more efficient
and big fiber optic lines, than other lines with bigger speed limitations. In this way, it
has been found that remaining areas from the node to a sole destination, known as
the "last mile" service, is achievable with the help of copper (Cu) or other forms of
wire. In this way, this study has successfully covered all main points on FTTN system
technologies for achieving delivery to multi customers within Australia (Ewing et al.,
2015).
3
The National Broadband Network (NBN) is currently being rolled-out across Australia
and there is a mix of technologies that are being used to deliver Internet services (for
example, FTTN, FTTC, FTTP, HFC, fixed wireless and satellite). Find and
summarise ONE resource that describes ONE of these delivery technologies. The
resource, and your summary, must focus on A SINGLE technology.
Broadband policy and rural and cultural divides in Australia:
Ewing, S., Rennie, E. & Thomas, J., 2015. Broadband policy and rural and cultural divides in Australia.
Digital divides : The new challenges and opportunities of e-inclusion, pp.107-24.
Summary:
As per the article written by (Ewing et al., 2015), FTTN is known as Fiber to the node
and it is one of the options for offering broadband telecommunications services for
multiple destinations. Besides, FTTN assists to provide broadband connection along
with the other data services from using a common network box that is called a node.
The paper has also suggested that FTTN is often called as fiber to the
neighbourhood. In other words, it has been found that FTTN serves a hundred
customers hence they must be present in a miles radius. In addition, the article
analysis suggests that consumer proximity to the nodes as well as delivery protocols
defines data rates. Moreover, both the FTTN and FTTC provide fiber optic Internet to
many of the Australian consumers at comparatively less expenses (Ewing et al.,
2015).
Apart from this, the chosen study has also covered one of the major benefits of FTTN
as well as similar systems as it has the ability of delivering data across more efficient
and big fiber optic lines, than other lines with bigger speed limitations. In this way, it
has been found that remaining areas from the node to a sole destination, known as
the "last mile" service, is achievable with the help of copper (Cu) or other forms of
wire. In this way, this study has successfully covered all main points on FTTN system
technologies for achieving delivery to multi customers within Australia (Ewing et al.,
2015).
3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Week 4
The Internet is made up of many interconnected servers and networks. Users are
increasingly aware and concerned that their Internet communications can be
intercepted and monitored. Tor is one technology that allows users to obscure or
hide online their online activities. Find and summarise ONE resource that describes
what Tor is and how it works. The resource, and your summary, must focus purely on
Tor.
An Examination of Tor Technology Based Anonymous Internet:
Chrane, C. & Kumar, S., 2015. An Examination of Tor Technology Based Anonymous Internet.
Proceedings of the 15th informing Science Institute International Conference.
Summary:
This study written by (Chrane & Kumar, 2015) has demonstrated an examination if
Tor technology for surfing internet anonymously. The study has highlighted the Tor
technology as one of the best ways for remaining hidden over the internet. In this
context, Tor Services is an online router, used for tunnel Internet connection as well
as bounce if off many anonymous servers, which are termed as "nodes," for
obscuring one’s computer's identity (Chrane & Kumar, 2015). This research has
suggested that Tor technology is effectively defends an individual’s identity with multi
layers of anonymity. In this way, it is more hidden than those of proxy servers where
only one gap amid the surfer and the proxy servers. Although the technology covered
by the Tor browser offers add-ons, yet they are slow. In this way, article study has
examined the more effective ways to utilise Tor technology by downloading the free
Tor browser bundle that includes Tor connection software as well as browser tailored
in order to optimize privacy of the users (Chrane & Kumar, 2015).
4
The Internet is made up of many interconnected servers and networks. Users are
increasingly aware and concerned that their Internet communications can be
intercepted and monitored. Tor is one technology that allows users to obscure or
hide online their online activities. Find and summarise ONE resource that describes
what Tor is and how it works. The resource, and your summary, must focus purely on
Tor.
An Examination of Tor Technology Based Anonymous Internet:
Chrane, C. & Kumar, S., 2015. An Examination of Tor Technology Based Anonymous Internet.
Proceedings of the 15th informing Science Institute International Conference.
Summary:
This study written by (Chrane & Kumar, 2015) has demonstrated an examination if
Tor technology for surfing internet anonymously. The study has highlighted the Tor
technology as one of the best ways for remaining hidden over the internet. In this
context, Tor Services is an online router, used for tunnel Internet connection as well
as bounce if off many anonymous servers, which are termed as "nodes," for
obscuring one’s computer's identity (Chrane & Kumar, 2015). This research has
suggested that Tor technology is effectively defends an individual’s identity with multi
layers of anonymity. In this way, it is more hidden than those of proxy servers where
only one gap amid the surfer and the proxy servers. Although the technology covered
by the Tor browser offers add-ons, yet they are slow. In this way, article study has
examined the more effective ways to utilise Tor technology by downloading the free
Tor browser bundle that includes Tor connection software as well as browser tailored
in order to optimize privacy of the users (Chrane & Kumar, 2015).
4

Week 5
An emerging form of malware is cryptojacking (also known as malicious
cryptomining). Find and summarise ONE resource that describes what cryptojacking
is and how it works. The resource, and your summary, should focus purely on
cryptojacking and NO OTHER form(s) of malware.
What is cryptojacking? How it works and how to help prevent it:
Symantec Corporation, 2019. Malware. [Online] Available at: https://us.norton.com/internetsecurity-
malware-what-is-cryptojacking.html [Accessed 20 May 2019].
Summary:
The chosen article study written by (Symantec Corporation, 2019), contained the
definition of cryptojacking as well as the process how it works. Besides, this
discussion has provided guidelines on how to prevent this malware to keep the data
safe and secure. In this context, author stated that cryptomining or cryptojacking is
an unauthorized utilisation of a laptop, computer, tablet, smart phone or any
connected home device through cybercriminals for mining for crypto currency
purposes (Symantec Corporation, 2019).
In addition, the study has included the results of Symantec’s internet security threat
report about cryptojacking. This study has also explained some important ways in
which cryptojacking may occur. Hence, one way of using malicious emails which can
install cryptomining code over a PC or computer has been highlighted in this
discussion. Therefore, the author has highlighted the useful ways to detect
cryptojacking by their symptoms. In this context, a high processor utilisation on one’s
device or overheating of the devices can sign towards a cryptojacking activity. On the
other hand, a sluggish or unusually slow response time of the browser also majorly
indicates the cryptomining activities. Thus, author has highlighted the malware
protection software use like Norton Security for preventing cryptojacking or
cryptomining (Symantec Corporation, 2019).
Week 6
Redundancy is a critical aspect of network design, implemented in order to cope link
or equipment failure. One frequent cause of failure is damage to fibre optic cables
that connect countries and/or continents. Find and summarise ONE resource that
5
An emerging form of malware is cryptojacking (also known as malicious
cryptomining). Find and summarise ONE resource that describes what cryptojacking
is and how it works. The resource, and your summary, should focus purely on
cryptojacking and NO OTHER form(s) of malware.
What is cryptojacking? How it works and how to help prevent it:
Symantec Corporation, 2019. Malware. [Online] Available at: https://us.norton.com/internetsecurity-
malware-what-is-cryptojacking.html [Accessed 20 May 2019].
Summary:
The chosen article study written by (Symantec Corporation, 2019), contained the
definition of cryptojacking as well as the process how it works. Besides, this
discussion has provided guidelines on how to prevent this malware to keep the data
safe and secure. In this context, author stated that cryptomining or cryptojacking is
an unauthorized utilisation of a laptop, computer, tablet, smart phone or any
connected home device through cybercriminals for mining for crypto currency
purposes (Symantec Corporation, 2019).
In addition, the study has included the results of Symantec’s internet security threat
report about cryptojacking. This study has also explained some important ways in
which cryptojacking may occur. Hence, one way of using malicious emails which can
install cryptomining code over a PC or computer has been highlighted in this
discussion. Therefore, the author has highlighted the useful ways to detect
cryptojacking by their symptoms. In this context, a high processor utilisation on one’s
device or overheating of the devices can sign towards a cryptojacking activity. On the
other hand, a sluggish or unusually slow response time of the browser also majorly
indicates the cryptomining activities. Thus, author has highlighted the malware
protection software use like Norton Security for preventing cryptojacking or
cryptomining (Symantec Corporation, 2019).
Week 6
Redundancy is a critical aspect of network design, implemented in order to cope link
or equipment failure. One frequent cause of failure is damage to fibre optic cables
that connect countries and/or continents. Find and summarise ONE resource that
5
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

describes ONE example of such a cable being cut or damaged. The resource, and
your summary, should describe the impacts of A SINGLE EXAMPLE of a link failure.
Note that the failure must relate to a link that connects countries and/or continents.
City of Meadville responsible for fiber optic cable cut that has caused widespread
phone outages:
The Meadville Tribune, 2014. City of Meadville responsible for fiber optic cable cut that has caused
widespread phone outages. [Online] Available at:
https://www.meadvilletribune.com/news/local_news/city-of-meadville-responsible-for-fiber-optic-
cable-cut-that/article_62cdbdd5-7481-5dbc-9dd2-0704a77f4c84.html [Accessed 20 May 2019].
Summary:
The chosen study has demonstrated a real life example of redundancy being a
critical aspect of network designing for connecting countries or continents. Thus, this
study has highlighted an example of how a fiber optic cable may be down because of
cutting and damage (The Meadville Tribune, 2014).
In this context, even while adhering to exact maintenance schedules, in some
circumstances fibre optic cable can get down. For an example, the Meadville tribune
published a case which described the efforts of repairing a fiber optics cable that was
severed from city officials in some current road maintenance at a connexion within
the city of Meadville, PA (The Meadville Tribune, 2014).
Apart from this, the article has covered an incident of City of Meadville responsible
for fibre optic cable damage which has majorly caused widespread mobile phone
outages. The example was about when Meadville workers were repairing a curb at
the connexion of water streets and willow. Hence, the city of Meadville workers
wrongly cut the fibre optic cable line within six inches of the cable surface. Therefore,
the damaged cable line caused severe problems for landlines and cell phones
connections. In this way, the article has successfully demonstrated the importance of
redundancy in a network connecting countries worldwide (The Meadville Tribune,
2014).
6
your summary, should describe the impacts of A SINGLE EXAMPLE of a link failure.
Note that the failure must relate to a link that connects countries and/or continents.
City of Meadville responsible for fiber optic cable cut that has caused widespread
phone outages:
The Meadville Tribune, 2014. City of Meadville responsible for fiber optic cable cut that has caused
widespread phone outages. [Online] Available at:
https://www.meadvilletribune.com/news/local_news/city-of-meadville-responsible-for-fiber-optic-
cable-cut-that/article_62cdbdd5-7481-5dbc-9dd2-0704a77f4c84.html [Accessed 20 May 2019].
Summary:
The chosen study has demonstrated a real life example of redundancy being a
critical aspect of network designing for connecting countries or continents. Thus, this
study has highlighted an example of how a fiber optic cable may be down because of
cutting and damage (The Meadville Tribune, 2014).
In this context, even while adhering to exact maintenance schedules, in some
circumstances fibre optic cable can get down. For an example, the Meadville tribune
published a case which described the efforts of repairing a fiber optics cable that was
severed from city officials in some current road maintenance at a connexion within
the city of Meadville, PA (The Meadville Tribune, 2014).
Apart from this, the article has covered an incident of City of Meadville responsible
for fibre optic cable damage which has majorly caused widespread mobile phone
outages. The example was about when Meadville workers were repairing a curb at
the connexion of water streets and willow. Hence, the city of Meadville workers
wrongly cut the fibre optic cable line within six inches of the cable surface. Therefore,
the damaged cable line caused severe problems for landlines and cell phones
connections. In this way, the article has successfully demonstrated the importance of
redundancy in a network connecting countries worldwide (The Meadville Tribune,
2014).
6
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Week 7
Since the 1990s, Enterprise Systems (also known as Enterprise Resource Planning
systems) have become critical to the operation modern organisations. Over this
time, ES/ERPs have evolved and continue to change in response to new demands
and emerging technologies. Find and summarise ONE resource that discusses
emerging or future trends for ES/ERPs. The resource should be recent (published
since the beginning of 2017) and it and your summary should clearly identify how
ES/ERPs are, or are about to, change.
Title and Reference:
Ranjan, S., Jha, V. & Pal, P., 2017. Application of emerging technologies in ERP implementation in
Indian manufacturing enterprises: an exploratory analysis of strategic benefits. The international
journal of advamced manufacturing technology, 88(1-4), pp.369-80.
Summary:
The writer of this article highlighted the important emerging trends for ERP in modern
organizations. The significance of the article is that knowing the recent trends for
ERP systems offers an opportunity to learn what people should do in their enterprise
for achieving the desired outcomes through an ERP system implementation. One of
the trend is requirement based ERP purchases. In addition, the discussion has
highlighted the trend that CRM is at the top priority. In addition to that, an increasing
focus over business intelligence ERPs is also highlighted as an emerging trend for
modern ERP systems in organizations (Ranjan et al., 2017).
Apart from this, author suggested that increasing requirements for specialised ERP
services is trending these days hence it requires to be adopted for the better growth
of the organization (Ranjan et al., 2017). One the other hand, this study revealed that
better integration architecture is the future trend for ERPs for providing competent
ERP solutions in future. Besides, this study has highlighted the act of acquiring
smaller groups by the big companies of this business era (Ranjan et al., 2017). In
this way, by highlighting the future as well as emerging trend in the context of ERP
implementation this study has focused on gaining profit from ERP implementation
within modern organizations while narrating the rising importance of ERP systems on
cloud and offline server.
7
Since the 1990s, Enterprise Systems (also known as Enterprise Resource Planning
systems) have become critical to the operation modern organisations. Over this
time, ES/ERPs have evolved and continue to change in response to new demands
and emerging technologies. Find and summarise ONE resource that discusses
emerging or future trends for ES/ERPs. The resource should be recent (published
since the beginning of 2017) and it and your summary should clearly identify how
ES/ERPs are, or are about to, change.
Title and Reference:
Ranjan, S., Jha, V. & Pal, P., 2017. Application of emerging technologies in ERP implementation in
Indian manufacturing enterprises: an exploratory analysis of strategic benefits. The international
journal of advamced manufacturing technology, 88(1-4), pp.369-80.
Summary:
The writer of this article highlighted the important emerging trends for ERP in modern
organizations. The significance of the article is that knowing the recent trends for
ERP systems offers an opportunity to learn what people should do in their enterprise
for achieving the desired outcomes through an ERP system implementation. One of
the trend is requirement based ERP purchases. In addition, the discussion has
highlighted the trend that CRM is at the top priority. In addition to that, an increasing
focus over business intelligence ERPs is also highlighted as an emerging trend for
modern ERP systems in organizations (Ranjan et al., 2017).
Apart from this, author suggested that increasing requirements for specialised ERP
services is trending these days hence it requires to be adopted for the better growth
of the organization (Ranjan et al., 2017). One the other hand, this study revealed that
better integration architecture is the future trend for ERPs for providing competent
ERP solutions in future. Besides, this study has highlighted the act of acquiring
smaller groups by the big companies of this business era (Ranjan et al., 2017). In
this way, by highlighting the future as well as emerging trend in the context of ERP
implementation this study has focused on gaining profit from ERP implementation
within modern organizations while narrating the rising importance of ERP systems on
cloud and offline server.
7

Week 8
Databases, mass data storage and interrogation technologies underpin virtually all
Information Systems and applications. However, the same tools also make it easier
for data breaches to occur in government departments or private
companies/organisations. In simple terms, a data breach is where private
information is illegally obtained or disclosed. Find and summarise ONE resource that
describes ONE example of a data breach that has occurred since the beginning of
2017. The resource, and your summary, should focus purely on A SINGLE
EXAMPLE of a data breach.
Equifax and the latest round of identity theft roulette:
Berghel, H., 2017. Equifax and the latest round of identity theft roulette. Computer, 50(12), pp.72-76.
Summary:
This research article has contained one of the biggest data breaches occurred during
2017. In this context, the author conveyed that Equifax has shaken the whole nation
by revealing the huge data breach. During September 2017, the American credit
monitoring company Equifax disclosed an enormous data breach which influenced
more than 143 million consumers (Berghel, 2017). The study suggested that Equifax
data breach is occurred because of a vulnerability found within open
source software utilised from the company Equifax. In this way, this open source
software allowed hackers or attackers for accessing the sensitive data files and
information of the Equifax. Besides, breached info contained names, Social Security
numbers, birth dates, addresses, and many more data. Moreover, the breached data
also contained more than 200,000 credit card numbers as well as 200,000
documents carrying personal-identifying info of the customers (Berghel, 2017).
The study has also revealed that while disclosing the data breach, the CEO of the
Equifax, Richard Smith, also released a video of apology. In whole, the data breach
of the Equifax was handled not well and hence widely criticized. In this way, this
study has covered a real-life example of a data breach occurred in 2017 so that
readers can get understanding about the significance of the data privacy and
confidentiality within Govt. and private organizations (Berghel, 2017).
8
Databases, mass data storage and interrogation technologies underpin virtually all
Information Systems and applications. However, the same tools also make it easier
for data breaches to occur in government departments or private
companies/organisations. In simple terms, a data breach is where private
information is illegally obtained or disclosed. Find and summarise ONE resource that
describes ONE example of a data breach that has occurred since the beginning of
2017. The resource, and your summary, should focus purely on A SINGLE
EXAMPLE of a data breach.
Equifax and the latest round of identity theft roulette:
Berghel, H., 2017. Equifax and the latest round of identity theft roulette. Computer, 50(12), pp.72-76.
Summary:
This research article has contained one of the biggest data breaches occurred during
2017. In this context, the author conveyed that Equifax has shaken the whole nation
by revealing the huge data breach. During September 2017, the American credit
monitoring company Equifax disclosed an enormous data breach which influenced
more than 143 million consumers (Berghel, 2017). The study suggested that Equifax
data breach is occurred because of a vulnerability found within open
source software utilised from the company Equifax. In this way, this open source
software allowed hackers or attackers for accessing the sensitive data files and
information of the Equifax. Besides, breached info contained names, Social Security
numbers, birth dates, addresses, and many more data. Moreover, the breached data
also contained more than 200,000 credit card numbers as well as 200,000
documents carrying personal-identifying info of the customers (Berghel, 2017).
The study has also revealed that while disclosing the data breach, the CEO of the
Equifax, Richard Smith, also released a video of apology. In whole, the data breach
of the Equifax was handled not well and hence widely criticized. In this way, this
study has covered a real-life example of a data breach occurred in 2017 so that
readers can get understanding about the significance of the data privacy and
confidentiality within Govt. and private organizations (Berghel, 2017).
8
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Week 9
Agile development is an iterative and incremental approach to delivering systems - it
is particularly useful where the requirements are unclear or evolving. Scrum is a
framework for undertaking agile development. Find and summarise ONE resource
that describes Scrum. The resource, and your summary, should focus purely on
Scrum and discuss some of its key features and attributes.
Requirements engineering in scrum framework:
Darwish, N. & Megahed, S., 2016. Requirements engineering in scrum framework. International
Journal of Computer Applications, 149(8).
Summary:
This research article has revealed the main findings about Scrum framework. In this
context, the discussion suggests that it is a framework for making as well as
sustaining complex products (Darwish & Megahed, 2016).
In addition, this is a framework into which individuals can resolve complex adaptive
issues, while creatively and productively delivering products carrying maximum
possible value. This resource has explained the Scrum framework as a process
framework which has been utilised to accomplish complex product development. In
addition, Scrum is not only a technique for forming products; but it is a framework
into which one can service more than two processes as well as techniques (Darwish
& Megahed, 2016).
This study has found that Scrum creates the relative efficacy of product management
and growth development practices in order to improve company revenues. Moreover,
this framework comprises of Scrum Teams along with their associated roles,
artifacts, events, and rules. All of the above mentioned components in the Scrum
framework assist a particular purpose and hence they are essential to success and
usage within an organization. In this way, it can be summarised that Scrum is a
procedural framework which declares certain events, rules, and roles for bringing in
regular manner (Darwish & Megahed, 2016). Thus, Scrum framework can be
adapted by any organization, on the basis of their needs, if the basic scrum rules and
regulations are not violated.
10
Agile development is an iterative and incremental approach to delivering systems - it
is particularly useful where the requirements are unclear or evolving. Scrum is a
framework for undertaking agile development. Find and summarise ONE resource
that describes Scrum. The resource, and your summary, should focus purely on
Scrum and discuss some of its key features and attributes.
Requirements engineering in scrum framework:
Darwish, N. & Megahed, S., 2016. Requirements engineering in scrum framework. International
Journal of Computer Applications, 149(8).
Summary:
This research article has revealed the main findings about Scrum framework. In this
context, the discussion suggests that it is a framework for making as well as
sustaining complex products (Darwish & Megahed, 2016).
In addition, this is a framework into which individuals can resolve complex adaptive
issues, while creatively and productively delivering products carrying maximum
possible value. This resource has explained the Scrum framework as a process
framework which has been utilised to accomplish complex product development. In
addition, Scrum is not only a technique for forming products; but it is a framework
into which one can service more than two processes as well as techniques (Darwish
& Megahed, 2016).
This study has found that Scrum creates the relative efficacy of product management
and growth development practices in order to improve company revenues. Moreover,
this framework comprises of Scrum Teams along with their associated roles,
artifacts, events, and rules. All of the above mentioned components in the Scrum
framework assist a particular purpose and hence they are essential to success and
usage within an organization. In this way, it can be summarised that Scrum is a
procedural framework which declares certain events, rules, and roles for bringing in
regular manner (Darwish & Megahed, 2016). Thus, Scrum framework can be
adapted by any organization, on the basis of their needs, if the basic scrum rules and
regulations are not violated.
10

Week 10
The textbook discusses activities associated with project management. However, it
could be argued that project governance is equally important, especially in very large
projects. Find and summarise ONE resource that describes what project governance
is and what activities it entails. The resource, and your summary, should focus purely
on project governance.
What is project governance and what are its origins? :
Ahola, T., Ruuska, I., Artto, K. & Kujala, J., 2014. What is project governance and what are its origins?
International Journal of Project Management, 32(8), pp.1321-32.
Summary:
The chosen article has explained the project governance as a set of three major
functions include set directions, makes directions as well as project oversights (Ahola
et al., 2014). With the help of this research study, author has highlighted the
importance of a leader as he or she knows the correct thing to do while
accomplishing projects (Ahola et al., 2014). Moreover, this paper raised the needs of
setting direction while considering short-term and long-term interests. In addition, as
per this resource project governance comprises tools of governance for ensuring
compliance with an implementation standard (Ahola et al., 2014). The study revealed
that project governance mechanism cannot be effective when there is no relationship
amid groups which are involved within the relevant project.
In this way, this study has covered the roles of project governance framework while
listing three project governance entailments including steering committee, executive
sponsor and project manager or director (Ahola et al., 2014). The study has been
proved as a useful resource to understand the concept of PG in the context of
organizational projects. Thus, PG is an elementary process for making any project
successful and achievable.
References
Ahola, T., Ruuska, I., Artto, K. & Kujala, J., 2014. What is project governance and what
are its origins? International Journal of Project Management, 32(8), pp.1321-32.
11
The textbook discusses activities associated with project management. However, it
could be argued that project governance is equally important, especially in very large
projects. Find and summarise ONE resource that describes what project governance
is and what activities it entails. The resource, and your summary, should focus purely
on project governance.
What is project governance and what are its origins? :
Ahola, T., Ruuska, I., Artto, K. & Kujala, J., 2014. What is project governance and what are its origins?
International Journal of Project Management, 32(8), pp.1321-32.
Summary:
The chosen article has explained the project governance as a set of three major
functions include set directions, makes directions as well as project oversights (Ahola
et al., 2014). With the help of this research study, author has highlighted the
importance of a leader as he or she knows the correct thing to do while
accomplishing projects (Ahola et al., 2014). Moreover, this paper raised the needs of
setting direction while considering short-term and long-term interests. In addition, as
per this resource project governance comprises tools of governance for ensuring
compliance with an implementation standard (Ahola et al., 2014). The study revealed
that project governance mechanism cannot be effective when there is no relationship
amid groups which are involved within the relevant project.
In this way, this study has covered the roles of project governance framework while
listing three project governance entailments including steering committee, executive
sponsor and project manager or director (Ahola et al., 2014). The study has been
proved as a useful resource to understand the concept of PG in the context of
organizational projects. Thus, PG is an elementary process for making any project
successful and achievable.
References
Ahola, T., Ruuska, I., Artto, K. & Kujala, J., 2014. What is project governance and what
are its origins? International Journal of Project Management, 32(8), pp.1321-32.
11
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 15
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.