There are ten (10) tasks, one for each week: the tasks are detailed below. There is a table to complete each task. Please fill in the information required. An example of a completed task is below. Note the first response is good – so aim for something like this. The second response is not acceptable, so if you submit anything like it, you won’t pass the assignment! The reasons? Poor resource selection (Wikipedia), no Harvard reference and a block cut and paste from the site (no citation, no original content)
This resource is a blog entry discussing the differences between CoBIT and ITIL. I chose this resource as there is a lot of confusion about the way in which ITSM is applied, and the distinction between the CoBIT and ITIL implementations is frequently unclear. Ibaraki explains that CoBIT provides the governance and metric structures while ITIL delivers on the actual mechanics and “how-to” processes. The author makes an interesting observation that it is wrong to simplify COBIT as providing the ‘why’ and ITIL providing the ‘how’ because both ITSM mechanisms have considerable overlap and both need to be used at the same time. I found this article very useful in explaining the differences and similarities between these two aspects of ITSM.
This page talks about ITSM. It says that IT service management (ITSM) refers to the entirety of activities – directed by policies, organized and structured in processes and supporting procedures – that are performed by an organization or part of an organization to plan, deliver, operate and control IT services offered to customers. It is thus concerned with the implementation of quality IT services that meet the needs of customers and is performed by the IT service provider through an appropriate mix of people, process and information technology.
Each resource summary should be a maximum of 300 words.
Task The past decade has witnessed tremendous advances in computing, wired and wireless communication, and storage technologies. Discuss the main features and applications of two mass storage technologies namely: direct-attached storage and network-attached storage.
The article describes the applications of direct-attached storage (DAS) and network-attached storage (NAS) elaborately. Paulsen, the author of this article explains numerous functionalities and features of NAS and DAS. I find this article quite informative and it explains DAS and NAS’s major features. DAS is known to provide the basic functionalities. Any organisations can get cost-effective service with the help of DAS. Low maintenance is required for DAS as well. The IT infrastructures can be facilitated by the usage of DAS, any organisation those who want to enhance their growth within a short period must take up DAS. DAS is applicable to small business. It is known to facilitate the low budget project. Paulsen further illustrates that DAS also facilitates those projects that have very little IT support. However, there are certain drawbacks of DAS. DAS is not applicable to large business. The large business which needs growth within a short period of time will not be benefitted by the adaptation of DAS. The author of this article also explains about the Network-attached storage. NAS basically involves sharing of files over the internet. NAS, unlike DAS, is applicable to a business that has little IT support. The organisations those who want reliable, as well as a flexible storage system, must take up the NAS. As per Paulsen, NAS is best suited for SMPs. The large organisations those who want to scale up the business must adopt the NAS. NAS provides easy solutions and reliable solutions during system failure. There is a drawback of NAS. Network-attached storage is not capable to transfer data in large number. I find this article helpful in knowing the details of the DAS and NAS. I get to know where DAS can be used and where NAS can be used.
Task Real-time operating systems are operating systems that guarantee a certain capability within a specified time constraint. Discuss the main benefits of real-time operating systems for the health sector.
The article illustrates in details the beneficial aspects of the Internet of Things (IoT) and Real-Time Operating System Real Time Operating system (RTOSes) in the health sector. I find this article suitable and it explains the impacts of IoT and RTOSes in the health sector. The IoT device can run on RTOSes thus RTOSes can improvise the IoT medical device’s performance in the healthcare sector. Abhinav states that effective patient engagement can be achieved by the usage of RTOSes and IoT. The patients with the aid of the device and the software can access the important information about health. The patients with the help of a website and mobile app can acknowledge their health conditions. The real-time data of the patients can be acquired by the healthcare managers with the help of IoT devices. Apple Watch and other similar health bands run on RTOSes are all IoT devices that are capable to provide real-time data of the patients. The fitness freak people can acknowledge how fit they are with the help of IoT devices. The IoT devices run on RTOSes measure blood pressure as well as sugar level of the patients. Therefore, the patients can diagnose their health at home with the help of RTOSes devices and they do not have to visit the doctors. According to the author, with the assistance of IoT, continuous health-check-up can be conducted. Thus the health sector can provide a cost-effective error-free diagnosis to the patients sitting at home. IoT-enabled devices like IoT-eyeglasses, IoT-hearing device run on RTOSes. These devices can facilitate the patients of the health sector. I read this article and find out how RTOSes devices are facilitating health sector.
Task Mobile Cloud computing has gained wide acceptance for organizations as well as individuals by introducing computation, storage, and software-based services. Explain the security and privacy issues about the use of the mobile Cloud computing in the finance sector.
The article describes all the security as well as the privacy issues associated with mobile cloud computing. The cloud computing can be a threat to the finance sector. I find this article quite useful to know the security issues of cloud computing that can prove to be disastrous for the finance sector. The finance sector must take into consideration the data breaches. The finance sector conducts business activities over the cloud platform. They store, access and process those financial data over the cloud data. The clients or the customers of those financial sectors access those data via mobile cloud computing. They transact money online via mobile phones and if these mobile devices are not secure and not protected then they can fall into the traps of the intruders. Mobile banking is conducted on the cloud platform and the cloud database. The unencrypted data stored in the cloud database can lead to security threats. The hackers can take advantage of the insecure network; insecure system and database can use them for their own profits and benefits. According to Us et al., the hackers steal those confidential data and conduct malicious activities. The hackers hack the bank account and steal all the money. In this way, the hackers can exploit the security loopholes the privacy of the customers can get threatened. The customers can lose all the money of their bank account due to this attack. Secured system configuration can help the customers to conduct mobile banking and mobile money transactions. The customers must stay aware and do not click on the link that can direct them to a malicious website. The article is quite informative and holds some important points with regards to security and privacy concern in the finance sector and mobile banking.
The article explains all the transport layer standards elaborately. I find this article informative. The article elaborates two major protocols and standards of TCP/IP and they are TCP and UDP. TCP stands for Transport Layer Protocol. TCP is basically connection-oriented. TCP establishes a link between the clients and server and then the message gets exchanged or transmitted between the server and the client. TCP is known to provide reliability and it ensures data transmission all the time. Data can get lost during transmission however that data can be recovered with the aid of the TCP. The sender sends data in a particular order, TCP ensures that the data will be received by the receivers in the same order the sender sends data. TCP is best suited for applications which need sequential delivery. The data gets transmitted in the form of the byte stream. TCP is relatively slow as it takes time to establish the link between the receiver and the sender. The header size of TCP is near about 20 bytes. HTTP and HTTPs are some of the examples of TCP. The author explains UDP in details in the article. UDP stands for User Datagram Protocol. UDP is connectionless protocol. UDP connection is best-suited multicast message distribution. UDP connection is not reliable. Also, it does not provide a delivery guarantee. The data packets are transferred individually and each of the packets is checked for integrity. UDP is faster in comparison to UDP. 8 bytes is the header size for UDP. NFS, DHCP, TFTP and DNS are some of the examples of UDP. This article helps me in knowing the transport layer standards elaborately.
The article explains all the ill effects of a cyber attack in the health sector. I find this article relevant and it includes the cybersecurity challenges that are faced by health sector in IoT era. There are multiple security threats related to the health sector. The malware attack can prove to be disastrous for the healthcare units and hospital management system. The intruders attack the system of the health sector and steal all the confidential data of the patients and the employees and then ask for money. The health sector staffs if agrees to pay the money then they get their files back. Denial of Service attack is one of malicious attack that affects the health sector. The hackers take advantage of the insecure network and make the entire system vulnerable. In this way, the confidential data of the clients and the customers get compromised. the hospital management staff and the health sector must create a security system to protect the patient's data, the financials of the health sector and the employees' details. The health sector team must implement make their network secure, must install an antivirus program. All the employees must set up a strong password to secure their system. If possible they must set up a two-step verification procedure. The employees do not follow the procedures and become victims. IoT devices are used in the health sector. The IoT thermo-meter used in the health sector records the breathing sound of the patients. The IoT devices then store the diagnosis result on the server. The security attack on IoT devices can provide faulty data and results. The hackers even delete the results from the server. For this reason, the doctors cannot diagnose the illness of the patients well and entire health sector unit suffers. I find this article helpful in explaining the cybersecurity risks that can negatively affect the health sector.
Task Internet of Things (IoT) Cloud is a model designed to facilitate the information society, enabling advanced services by interconnecting physical and virtual things based on, existing and evolving, interoperable information and communication technologies through ennoblement of ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources. Explain the importance of real-time data capture capability, data visualization, data analytics, and API protocols in the application of IoT Cloud.
The article explains the value of data visualization, data analytics, and data capture capability. The article also explains about the API protocols. The IoT clouds offer several advantages. I choose this article since this article contains the relevant information about the IoT cloud. The author describes in this article about several advantages of IoT cloud. IoT generally collects data about consumers and various kinds of products. The IoT can help the organization to know the behaviour of customers in details. The organization can know the details of the products the consumers use with the aid of IoT. IoT can facilitate the organizations so that they can provide better customer service. IoT assists in data analysis. As per author, customer communication can be simplified with the aid of IoT. The data gathered can be transmitted to the clients or consumers via text messages or emails and all these are possible for IoT. For instance, the IoT enabled smart meters are capable to switch off the light of the empty rooms. The IoT also helps to identify the food packets that are going out of date. The organizations with the implementation of IoT can manage the inventory. The IoT also helps to acknowledge the products which are damaged, the products which are shipped. And the products which are already used. The organizations thus can work efficiently with the help of IoT. IoT offers the facility of data visualization in real time and this has been explained in the report in details. According to the author of the article, the IoT also provides security to the customers. The IoT-enabled CCTV camera can assist in monitoring the suspicious activities. I find this article beneficial in knowing various beneficial aspects of IoT. The information related to data visualization and data capture capability can be acquired with the help of IoT.
Task A Social Network Service (SNS) is a kind of web service for establishing a virtual connection between people with similar interests, backgrounds, and activities.
The article illustrates various security solutions by which Social Network Service can be made secure. I choose this article since this article provides necessary security information about the Social Network Service (SNS). The article also explains about various mitigation techniques following which security threats can be handled effectively. Varied social media policies following which the SNS can be secured have been explained in the report. Different organizations follow different policies; however, the basic guidelines are somewhat same for all the policies that organizations adopted. The security policies can help the organizations to conduct the business activities safely and securely. Also, this approach can help the users and the customers to assure the safety of their system and database. The clients of the organizations must also follow the policies imposed by the organizations. The employees should be aware of all those guidelines as well. The guidelines and the policies can help the employees to fight against the malicious software attack and take necessary actions. They must be trained well so that they can safeguard organization’s system. The employees must know how to security policies as that can help them to provide better customer service. They can even solve minor security attack as well. The organizations must install an antivirus program. Software like LastPass can help to safeguard passwords. Antivirus software like Kaspersky can be helpful in preventing scams, viruses and malware. I chose this article and this article illustrates how the system can be secured following policies and guidelines.
The article illustrates the challenges in details. The organizations mainly suffer due to the attitudes, fragmentation, infrastructure and skills. I find this article appropriate as it explains all the challenges of big data in details. Team, the author of this article explains that any organisations deal with storage, bandwidth, CPU and structure. The organizations who have not adopted big data yet are completely unaware that how many resources are required for them to conduct the business activities. The organizations know that the big data will assist them to scale up the business but the organizations do not know the procedures. The employees and the management staffs are not used to the technology so it is a challenge for them. They will have to learn various aspects of big data and cloud computing before adopting and use the big data. They must be knowledgeable about how big data can facilitate their business. The organizations must train their employees so that they can conduct the business activities using big data effectively. Organizations must appoint business analyst as well. The business analyst is responsible to analyze the entire business and will suggest how the organizations should use the big data. The article also explains about fragmentation, the organizations can face several risks due to fragmentation. The adaptation of big data is a huge challenge and the organizations will have to integrate all their resources and services. They can face loss, The organizations can lose the customer base. Besides all that, the organizations will need a lot of time to take up the big data technology, they can face loss economically. I find this article quite helpful as it elaborates all the challenges associated with big data.
The article illustrates the several advantages of lean and agile practices. I find this article quite informative. The article focuses on the agiler methodologies which every organization should follow to acquire the maximum benefits. The project management team must work in accordance with the standards ISO 62304, DO-178B and ISO 26262. The management team can follow the agile project methodology as that can help them to mitigate the risks. The project management team can get relatively less rework if they follow the lean and agile project methodology. The project management team can be able to complete the task within the set deadline. As per author of the article, the organizations must follow the agile methodology as that can give the effective outcome. The project management team while working on the project must submit partial to the clients. The clients if approve the partial then the project management team should carry on the work, if the clients disapprove, then the project team must rework and should reshape the project according to the clients' demands, in this way they can carry on the project activities and can finish the project. The agile project methodology prioritizes works, the project methodologies involving high risks can be easily mitigated within short range of time. Agile project management allows multiple solutions by which the project risk can be identified and can be solved. The organizations are free to use any of the solutions that suit them. All the solutions will give more or less similar outcome. The agile methodology can really help the organizations to gain profit. I find this article quite useful as the article defines the benefits that organizations can get adopting the agile methodology.
The article defines various benefits of the Information and Technology (ICT) in the report. The article depicts the beneficial impact of ICT on the environment, social relationships and economy. I find his article depicting the impact of ICT on economic, environmental and social relationships. The ICT facilitate the communication. According to Ofonimeh, ICT can help the individuals to stay connected with each other all the time. The customers and the employees can communicate and thus both the organization and the customers can be benefitted, thus ICT facilitates the social relationship. The ICT has turned the entire world into global village. ICT offers multiple facilities like communication over satellite cable network, video conferencing. ICT helps to conduct e-commerce activities. Ofonimeh explains that the skilled businessmen those who want to carry out cost-effective fast solutions can be benefitted by adopting ICT. The ICT will enable the organisations to work online all day and night 24x7. The organisations with the help of ICT can sell their products online. The customers can choose the product and can purchase it online. The organisations with the help of ICT can be able to keep track of the products they purchase, the products they browse. In this way, the organisations can predict the customers' behavioural patterns. Thus ICT can enhance the sales and productivity of the organisations. Moreover, they can connect with the customers, thus ICT helps organisations economically. ICT also creates an impact on the environment so that sustainable environment can be built using ICT. I find this article useful. The article depicts the impact of ICT on social relationships, environment. And the economy, that is why I choose this article.