Answer To: COIT 20246 ASSIGNMENT SUBMISSION Due date: Thursday Week 11 (2PM AEST) Part: Written Assessment...
Shikha answered on May 09 2020
COIT 20246 ASSIGNMENT SUBMISSION
Due date:
Thursday Week 11 (2PM AEST)
Part:
Written Assessment
Weighting:
30% of total assessment.
Submission:
Electronic (see course website for details)
Instructions
It will be necessary to use literature/online resources to complete this assignment, please ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this assignment is to be in your own words. You will lose marks if you do not use your own words!
Please complete your assignment using this submission template file, inserting your responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the formatting of other pages including the headers and footers.
Please fill in the following details:
Student Name
Student Number
Tutor’s Name
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is a table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Week 1
The text discusses how modern CPUs function. Recently a critical flaw in microprocessor design has been discovered that allows two extremely serious security exploits: Spectre and Meltdown. Find and summarise ONE resource that describes how either of these exploits work. The resource (and your summary) should focus on what is occurring in the CPU that allows these exploits to occur.
Threats and Vulnerabilities of Cloud Computing: A Review
Reference: Suryateja, P.S., 2018. Threats and Vulnerabilities of Cloud Computing: A Review.
URL: https://www.researchgate.net/profile/Pericherla_Suryateja/publication/324562008_Threats_and_Vulnerabilities_of_Cloud_Computing_A_Review/links/5ad5bf9d458515c60f54c714/Threats-and-Vulnerabilities-of-Cloud-Computing-A-Review.pdf
Summary:
In order to protect and safeguard data, many companies and organizations are now moving to cloud computing for data storage, preservation and easily accessibility of data when required.
This resource tells us about the various threats and vulnerabilities which can attack data and in turn harm the organization or put the company at risk. Spectre and Meltdown are also considered one of the threat which can be harmful. Below are the details from the resource –
A weakness in the system working can be termed as vulnerability and when such a or many vulnerabilities are exploited by attackers it may prove to be a threat to the system. One such threat or vulnerability which can be harmful to the working of system is Spectre and Meltdown.
Spectre and Meltdown: These are the latest discovered set of vulnerabilities. Any computer chip manufactured almost two decades ago also can be affected by this threat. Once attacked, these exploits can allow the attacker to access any and every information on the system which seemed to be safe and secured. The attacker can gain access any information from the kernel with unauthorized login granted by this exploit and moreover if you are a root user, who are privileged to read the information on the host kernel also. Although patches are available to deal with this, but still these patches does not guarantee full security, it will only make the attackers task hard. Unfortunately these patches decrease the overall performance of the system.
Week 2
Prior to 1985, there were very fewOperating Systems (OSes) that used Graphical User Interfaces (GUIs). Find and summarise ONE resource that describes ONE of these GUI operating systems. The OS must have been release prior to 1985 so cannot be Microsoft Windows.
List of GUI-Based Operating System and Its History
Reference: Purwaningrum R (2012), List of GUI – Based Operating Systems and its History.
URL: http://e-techinnews.blogspot.in/2012/06/list-of-gui-based-operating-system-and.html
Summary:
Graphical user Interface allows a user to have a friendly interface with computers. It is more than an operating system which makes the interaction between computer and user more interactive. It is the result of GUI that computers have been so attractive and easier to operate in recent times.
GUI technology has been used since many years to develop various user friendly operating systems. The first eve GUI OS developed was by Apple in the name of Macintosh. Later other developer also started developing software’s and operating systems based on GUI application. Below is the description of one the GUI operated system in the year developed prior to 1985.
Mac OS System 1.0
For the purpose of Macintosh, this GUI operating system was developed. It is believed that this operating system had many features like that of a modern operating system. It had a feature of displaying icons for every window and also did it allowed users to click these icons with the help of mouse. Feature of dragging and pasting files to one or many folders was also available in this software, Thus a user can simply click a file and drag it to any desired location thus making the work easier. This operating system was developed for Apple but now it is released as a new version for OSX Snow Leopard. Mac OS System 1.0 can be considered as one of the reason for making Apple having one of the best Graphical User Interface operating systems in the world.
Week 3
Low-Powered Wide-Area Networks (LPWANs) are wireless communication networks that are characterised by linking devices over large distances. Devices (including simple sensors) typically can only communicate at very low bit rates, however, the communication and associated electronics consume very little power. As such, LPWAN devices can be battery powered and operateindependently for many months or even years. Find and summarise ONE resource that describes ONE platform or technology that implements a LPWAN.
Evaluation of LoRa LPWAN technology for remote health and wellbeing monitoring
Reference: Petäjäjärvi, J., Mikhaylov, K., Hämäläinen, M. and Iinatti, J., 2016, March. Evaluation of LoRa LPWAN technology for remote health and wellbeing monitoring. In Medical Information and Communication Technology (ISMICT), 2016 10th International Symposium on (pp. 1-5). IEEE.
URL: https://ieeexplore.ieee.org/abstract/document/7498898/
Summary:
Above mentioned resource contains details of LORA which employs LPWAN Technology. The details are as follows –
1) Main characteristic of LPWAN are –
· Low Power consumption
· Low priced transceiver chip
· Large area of coverage
2) It is expected that LPWAN can be employed in applications which can monitor human health and well being.
3) To test its effectiveness measurements were conducted in University of Oulu, Finland. This university has a huge area of...