Discuss specific example of highly effective malware attacks

Assignment Help Computer Engineering
Reference no: EM13841509

The purpose of this assignment is to select and discuss relevant online resources that exemplify the application of the topic(s) nominated each week (1 - 10). This assignment can (and should!) be completed progressively (i.e. each week). There are ten (10) tasks, one for each week: these are detailed below and in the template.

Assignments received 14 days or more after the due date will not be marked and will receive zero. Students may apply for extensions but must provide documentary evidence to support their request (for example, a medical certificate). Short extensions of one to two days will be considered as long as students include their nearly completed assignment (i.e. one or two tasks to yet be completed) in their extension request.

It will be necessary for students to use literature/online resources to complete this assignment, so please ensure you cite and reference any such materials using the Harvard format. Marks will be deducted for incorrect referencing, so please ensure you follow the referencing guide. Plagiarism detection will be used in this assessment.

It is VERY important that you do not copy content directly from either the text or Internet resources: this assignment is to be in your own words. You will lose marks if you do not use your own words! Actual plagiarism will result in the instigation of the student misconduct process.

What do I need to do?

Download the template. There are ten (10) tasks, one for each week: the tasks are detailed below (and also in the template file).
Each task requires you to collect and summarise two (2) online resources. Each resource summary should be around a maximum of 150 words. You should collect interesting and relevant resources that address the task. The resources must be specific to the topic (i.e. just focus on a technology or topic). These can include online blog posts, trade and academic articles. The resources should be substantial and contain information directly pertinent to the task. Each resource must contain different information (i.e. do not collect two resources that provided the same information). The course textbook (and textbooks in general), sites such as Wikipedia and HowStuffWorks are not suitable resources.

For each task, there is a table to complete in the template. Please fill in the information required and submit the document via this page by the due date.

Task

1 One aspect of week one was data compression. An everyday use of data compression is in the transmission of video. Collect and summarise two resources that explain the specific technologies/standards that underpin video compression. The resources must not be about the same technology/standard.

2 When we think about operating systems, we tend to focus on modern software like Windows, Linux and OS X. But what of the past: what were the forerunners of these systems? Collect and summarise two resources that describe specific operating systems that were prevalent in the 70s, 80s and early 90s. The resources must not be about the same operating system.

3 Week three covered material that mentioned specific network hardware such as modems, switches and routers. Collect and summarise two resources that describe the major commercial manufacturers of network hardware. The resources must not be about the same company.

4 The text chapter for week four mentions Application layer protocols such as HTTP/HTTPS. Collect and summarise two resources that discuss other Application layer protocols. The resources must not be about the same protocol.

5 New and novel forms of malware are released daily. Collect and summarise two resources that discuss specific examples of highly effective malware attacks. The resources must not be about the same malware. Hint: most of the most effective attacks are known by the name given to the worm/virus etc. or the vulnerability.

6 Latency and Jitter are key QoS metrics. Collect and summarise two resources that discuss how negative aspects of these metrics affect communication and/or how they can be minimised. One resource should focus on Latency and the other on Jitter.

7 Internet-based collaboration products (software/environments) are critical to productivity in most modern organisations. Collect and summarise two resources that discuss examples of these products. The resources must not be about the same product.

8 "Big Data" is regarded by some as the challenge of the decade. Collect and summarise two resources that discuss technologies that can be used to store, manage or analyse Big Data sets. The resources must not be about the same product or technology.

9 Outsourcing of "off-shoring" and organisation's IT function, particularly the development and operation of its major Information Systems, is a contentious decision. Collect and summarise two resources that discuss the pros and cons (benefits and risks) of outsourcing. One resource must be about the "positives" and one must be about the "negatives".

10 The text discusses three dimensions of project risk: project size, project structure and experience with technology. Collect and summarise two resources that exemplify the result of not managing these risks successfully (i.e. resources that discuss projects that have failed because of one of these risks). The resources must not be about the same risk.

Hints

Hint 1: Do a bit every week

This assignment is not onerous, especially if you complete each weekly section as you complete each week of the course - that means writing less than 300 words per week. However, it will be much harder if you try to complete all ten sections in week eleven!

Hint 2: Choose interesting and relevant resources

You will be assessed on the relevance of resources. Choose specialised, specific resources that helped you gain a deeper understanding of the topic area. Do not use generic web pages from sites like Wikipedia and "How-Stuff-Works". Make sure each resource provides different information.

Hint 3: Look at this example

An example of a completed task is below. Note the first response (Resource 1) is good - so aim for something like this. The second response (Resource 2) is not acceptable, so if you submit anything like it, you won't pass the assignment! The reasons? Poor resource selection (Wikipedia), no Harvard reference and a block cut and paste (highlighted) from the site (no citation, no original content).

Example

Task Find two resources that explain aspects of IT Service Management.

Resource 1

(Good Response) Title and Reference:
COBIT versus ITIL

IBARAKI, S. 2014. COBIT versus ITIL [Online]. Available: https://blogs.technet.com/b/cdnitmanagers/archive/2014/04/06/cobit-versus-itil.aspx [Accessed 29/01/2015 2014].

Summary:

This resource is a blog entry discussing the differences between CoBIT and ITIL. I chose this resource as there is a lot of confusion about the way in which ITSM is applied and the distinction between the CoBIT and ITIL implementations is frequently unclear. Ibaraki explains that CoBIT provides the governance and metric structures while ITIL delivers on the actual mechanics and "how-to" processes. The author makes an interesting observation that it is wrong to simplify COBIT as providing the ‘why' and ITIL providing the ‘how' because both ITSM mechanisms have considerable overlap and both need to be used at the same time. I found this article very useful in explaining the differences and similarities between these two aspects of ITSM.

Resource 2

(Bad Response)

Title and Reference:

https://en.wikipedia.org/wiki/IT_service_management

Summary:

This pages talks about ITSM. It says that IT service management (ITSM) refers to the entirety of activities - directed by policies, organized and structured in processes and supporting procedures - that are performed by an organization or part of an organization to plan, deliver, operate and control IT services offered to customers. It is thus concerned with the implementation of quality IT services that meet the needs of customers, and is performed by the IT service provider through an appropriate mix of people, process and information technology.

Hint 4: Ask!

If something in this assignment description is unclear, or you are just not 100% sure about something, please ask for help. Your teaching team really do not mind if you ask us to clarify something. We do mind when we have to fail you because you haven't submitted what was asked or met the assignment requirements

What do I need to submit?

You are required to submit a single document in Microsoft Word format (.doc or .docx). Use the template as the basis for your submission. Apart from providing your response to the weekly tasks, do not modify the document - especially do not delete the marking sheet.

Reference no: EM13841509

Questions Cloud

Write essay on has to be between owen and sassoon : Arguementive Essay- From the Book "World War One British Poets" Has to be between Owen (Can not use"Dulce Decorum Est" and Sassoon
Emerging leadership trends and theories : Emerging Leadership Trends and Theories
Perform some basic sql join commands : Perform the following from the SQLZoo site. In the labs at school, you can generate a .pdf by printing the page to the pseudo printer CutePDF Writer. If you use the Chrome browser, it has a built-in feature for creating PDFs.
Media multitaskers pay mental price : Write summary of this given article - Media Multitaskers Pay Mental Price, Study Shows
Discuss specific example of highly effective malware attacks : Collect and summarise two resources that discuss specific examples of highly effective malware attacks. The resources must not be about the same malware.
Globalization and risk : Globalization and Risk
Explain function without the use of a wlan controller : What are the two terms most often used to describe an AP that is able to function without the use of a WLAN controller
Political and legal differences : Political and Legal Differences
Software development project : Software development project

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd