How does a virus differ from a worm

Assignment Help Operating System
Reference no: EM132903071

Part 1: Concepts

Please answer the following questions in complete sentences. Your answer for each question should be about 150 words.

1. Why is it important to distinguish between mechanisms of protection and policies of protection?
2. What is an access matrix, and how can it be implemented?
3. How does a virus differ from a worm?
4. What is the difference between symmetric encryption and asymmetric encryption?
5. What are the two main varieties of authentication algorithms?

Part 2: Research Project
In Part 2, you will investigate technical problems of operating systems, and provide a written report. Your research should focus on an in-depth topic about theories, algorithms, approaches, mechanisms, or implementation of one of the following fields of operating systems:
process management process and thread

CPU scheduling synchronization deadlock handling
storage management main memory virtual memory file systems
mass-storage and I/O protection and security
distributed, real-time, and multimedia systems

Your topic could come from a sub-problem of cutting-edge research problems discussed in the literature (i.e., investigating a technical problem).

If you have trouble deciding what topic to work on, contact your tutor, who can advise you on the suitability of the topic and/or suggest modifications. Note that topic selection is part of your assignment requirements for this project, so you cannot rely on your tutor to assign a topic.
To ensure that your topic has adequate depth and coverage, you MUST write a one-page proposal that outlines your area of interest and associated references you will use. Send it to your tutor for consideration before you begin your project work, preferably allowing at least two weeks for consultation.

In your paper (expectations outlined below), make sure you highlight your work and outcomes in your own words. You must also properly cite any viewpoints, methods, algorithms, data, results, figures, tables, etc. that you borrow from other papers or contributors that you discuss or include in your paper/report. All references cited should be published, or at least be publicly available, stable, and accessible online (referenced in APA or IEEE Style). Using the work of others without proper credit in your paper/report may lead to a form of plagiarism, which is not tolerated in AU courses.

Please review the S tudent Academic Misconduct Policy for more details.

Research Paper

Your investigation will be based on recent publications (i.e., published in the past five years) such as journal/conference papers and technical documents, and the applicable software packages (open source preferred). You are encouraged to read some papers about new techniques in
operating systems.

SOSP: ACM Symposium on Operating Systems Principles (ACM) ACM SIGOPS Operating Systems Review (ACM) ACM Transactions on Computer Systems (ACM) IEEE Transactions on Computers (IEEE) ACM Computing Surveys (ACM) Communications of the ACM (ACM) IEEE Computer. . . (IEEE) Linux Journal (ACM)

Once you have chosen your topic, you need to identify meaningful, feasible outcomes for your research on the topic. Overall, the outcomes should interest and benefit the professional community of operating system research and development. Some possible outcomes:

analysis, findings, and discovery of problems.
results of your tests, surveys, and comparative analysis. proposals for new or improved methods, algorithms, etc. meaningful implementation plans.
insight on future directions.

Present the outcomes of your research in a 10- to 15-page paper written in a journal or conference paper format. References should be cited using APA or IEEE Style. Your paper should include the following sections:

Title

Abstract: no more than 300 words.

Introduction/background: motivation for research and introduction to the outcomes, including a literature review and reference citations.

Methods: describe the problem and the methods you used to explore or address the problem.

Results and findings: research results or exploration findings, including theoretical analysis and any experimental and implementation results you accomplished based on your methods.

Related work: summarize related work by others; compare your methods and results with others' work. Cite your references.

Conclusion and future work: conclude your exploration and research, and suggest possible future work on the topic.

References: include all references cited in your paper, using APA or IEEE Style.

Appendix: Includes a list of your data, design/implementation, and source codes (as applicable), and software necessary for running your programs (if applicable). The Appendix isn't part of the page count for your paper.

Attachment:- Concepts.rar

Reference no: EM132903071

Questions Cloud

State how this training links to organizational objectives : State how this training links to the organizational objectives. Discuss your selected training process model, and describe why you recommend this model.
How i have used my via character strengths : How I have used my VIA character strengths as a student and/or in the workplace. (Must include discussion of at least THREE VIA character strengths from the stu
Explain the concept of quality function deployment : Explain the concept of quality function deployment. Link your answer to how QFD can be used to understand if suppliers are in control of the processes in which
Evaluate business-level strategy of either starbucks : Evaluate the business-level strategy of either Starbucks or Lockheed Martin to determine whether you believe strategy is appropriate to offset forces industry.
How does a virus differ from a worm : Why is it important to distinguish between mechanisms of protection and policies of protection and What is an access matrix, and how can it be implemented
Find an article that talks about unemployment : Find an article that talks about Unemployment and the lack of economic opportunity. (Cite/reference article below)
Corruption in country and economic development : How would you explain the correlation between the amount of corruption in a country and economic development?
What is the regular unit selling price : Manitoba Telecom Services (MTS) purchases an iPhone for $749.99 less discounts of 25% and 15%. MTS's expenses are known to average 30% of the regular unit selli
Quebecor printing business more profitable : Quebecor Printing is a commercial printing company that is expanding, acquiring ailing printing companies, and moving into international markets.

Reviews

Write a Review

Operating System Questions & Answers

  Analyze potential operating system based cyber attacks

Analyze potential operating system based cyber attacks. Characterize the bad actors that might perform operating system based cyber attacks.

  Advantages and disadvantages of major operating system

Consider the advantages and disadvantages of each major operating system that Amy might use on the Web server. In a one-page memorandum to Amy.

  Discussing the benefits and detriments of unikernel design

Discussing the benefits and detriments of a Unikernel design - However, begin pondering the design elements and revisit as we move through the course material.

  Explain why other operating systems may or may not fit

Explain why your company's proprietary operating system will have to be upgraded. Explain why other operating systems may or may not fit.

  Explain the design of your firewall

A simple firewall is a filter which blocks the packets based on the pre-defined filter rules. There are two general strategies to set-up a filter. Explain the design of your firewall (filter rules)

  Differences and similarities between linux and unix?

What are some distinct differences and similarities between Linux and Unix? Why do you think it is important to know about both of these operating systems

  Operational relates to the mission of business

Discuss how the three levels of management hierarchy: strategic, management, and operational relates to the mission of a business.

  Compare three mobile platforms

You have just been given an assignment to compare three mobile platforms for the following project. Orion is an online service company that enables member subscribers to conduct their own online surveys. Orion has decided to extend this service

  Why is it that threads are faster

Why is it that threads are faster to create than processes? What advantage do kernel threads provide over user threads? Give an example of a user thread package.

  What security features can be highlighted in the system

Analyse and Discuss the significance of use cases of UML specification - What security features can be highlighted in the system?

  Disadvantages to living in an information age

Discuss some of the disadvantages to living in an Information Age? At present more and more people rely on computers to create, store, and manage critical information.

  CMP73001 Cybersecurity Management Assignment

CMP73001 Cybersecurity Management Assignment Help and Solution, Southern Cross University - Assessment Writing Service.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd