Response Assignment | Homework Help Websites
Article 1:
Discussion point :
Topic: Computerized Operating Systems (OS) are almost everywhere. We encounter them when we use out laptop or desktop computer. We use them when we use our phone or tablet. Find articles that describes the different types of operating systems (Linux, Unix, Android, ROS, z/OS, z/VM, z/VSE, etc). Do not select MS WINDOWS. Write a scholarly review of comparing any two or more OS; attach a copy of the article to your postings. Remember, this assignment is to be scholarly; it is not enough for you to simply post your article and add cursory reviews. Cited references are required.
Occupation of a working framework is to deal with all the product and equipment on the PC, so fundamentally a large portion of the in our PC there will be various projects will keep running at once, all things considered there ought to be the focal preparing unit(CPU) which will deal with the various projects, and memory and capacity is likewise required to keep up the various projects. Also, once more, in this kind of situations the working framework will come into the image, and facilitates with each program and ensure that each program get it needs.
At that point we have diverse sorts of Operating frameworks, and now a days in the event that you purchase the PC, the working framework is the worked in programming in the frameworks or in the PCs, so the general population who purchase the PCs or the work areas will utilize the default worked in working framework that accompanies the machine, and furthermore there is plausibility of updating the working framework. The most well-known working frameworks are MAC OS X, and LINUX. In the directing working frameworks individuals fundamentally utilize graphical UI or it is additionally named as GUI, along these lines, essentially this graphical UI will enable your mouse to tap the symbols, catches and different menus, at whatever point you tap the progressions will be unmistakably shown on the screen with the blend of the designs and furthermore the content. At that point coming to MAC OS X it is an inline working framework made by APPLE, and the MAC OS X will have the default worked in Macintosh PCs or MACs in it. What’s more, the most recent adaptation of the MAC OS will be OS X which can be articulated as (OS – TEN), and the MAC OS prior forms are EI Capitan which was discharged in 2015, Yosemite was discharged in 2014, Mavericks was discharged in 2013, Mountain Lion was discharged in 2012, and Lion was discharged in 2011. Be that as it may, the level of MAC clients are less contrasted with the windows clients, one reason is Macintosh PCs will in general be more costly than that of windows pc’s. At that point the LINUX working framework, which has a place with the group of open-source working framework. What’s more, one of the upside of the LINUX can be adjusted and dispersed by anybody on the planet.
It a multi-show database encompassed and advance by Oracle Corporation. It is one of the world’s run of the mill databases running system of endeavors, for instance, online exchange overseeing, blended database extraordinary main jobs, and database warehousing. Influencing execution with respect to this database impacts its respect. This set the dimension of parts and necessities that call for effective activities. In any case, a poor use may offer moving to guaranteed wretchedness to the data association framework. This joins net information harm and information calamity that might be utilized particularly at whatever point there is no great help structure.
Examples of working frameworks for PCs consolidate Macintosh OS, Unix, and Linux. Minimal component of any working framework is its bit. This is the foremost layer of programming stacked into memory when a framework boots or starts up. The portion offers access to various ordinary center administrations to all other framework and application programs. These administrations join, anyway are not limited to: circle get to, memory the executives, undertaking booking, and access to other equipment gadgets.
Reference:
Cashmore, M., Fox, M., Long, D., Magazzeni, D., Ridder, B., Carrera, A., … & Carreras, M. (2015, June). ROSPlan: Planning in the Robot Operating System. In ICAPS (pp. 333-34)
Kushwaha, A., &Kushwaha, V. (2011). Location based services using android mobile operating system. International Journal of Advances in Engineering & Technology, 1(1), 14.
Singh, P., Yadav, S., & Agrawal, S. (2015). A Brief Study on Different Operating System. International Journal Of Engineering And Computer Science., Vol.4, Iss.1, 1-3.
Article 2:
Discussion point :
Topic: Computerized Operating Systems (OS) are almost everywhere. We encounter them when we use out laptop or desktop computer. We use them when we use our phone or tablet. Find articles that describes the different types of operating systems (Linux, Unix, Android, ROS, z/OS, z/VM, z/VSE, etc). Do not select MS WINDOWS. Write a scholarly review of comparing any two or more OS; attach a copy of the article to your postings. Remember, this assignment is to be scholarly; it is not enough for you to simply post your article and add cursory reviews. Cited references are required.
Linux might be an OS-like programming framework that was made to blessing individual PC clients a basic or extremely modest programming framework simply like normal and ordinarily extra costly Unix tasks. UNIX envelops a character as a greatly successful and quick performing watch. UNIX stayed one among the chief ASCII content record advancements, anyway numerous developers have another and answered bundle that is completely ASCII content document for each client. It proposes that you simply will exchange the approval code conjointly alter it any vogue you wish. A few engineers have confinements on anyway you’ll have the capacity to share the framework. for instance, a few designers adjust you to change the framework, nonetheless, you can’t share it for business.
UNIX is a working structure which was first made in the 1960s and has been under clear change starting now and into the not strikingly released. By working structure, we mean the suite of endeavors which make the PC work. It is a stable, multi-customer, playing out different assignments structure for servers, work zones, and workstations.
UNIX structures other than having a graphical UI (GUI) like Microsoft Windows which gives an easy to use condition. Unix is a Full performing confining assignments by watched memory. Specific customers can control clear undertakings all at the inadequately delineated time without conflicting with some other or breaking the strategy. Exceedingly staggering virtual memory, such wearisome can work with a sensible number of all around wrapped examinations. Access necessities and prospering. All customers must check by a veritable record and key to use the structure by any stretch of the creative centrality. Heavenly constructed records have all records. The buyer can pick whether others have seen or make the course to his data. A strong system of little affiliations and affiliations that do official obligations well – not tangled up by spaces of remarkable rights. Unix is a particularly stacked contraption stash, not a Titanic. Ability to string headings and affiliations dependably in colossal ways to deal with oversee coordinate control encourage reinforce control play out the not actually the proportionate as befuddling commitments – not bound to preconfigured blends or menus, as in private PC attempts. A by and large that really matters bound together record change.
References :-
Bala, K. Sharma, S. & Kaur, G. (2015). A Study on Smartphone based Operating System. International Journal of Computer Applications, pp. 17-22.
Suresh Kuppan. (2016). Advantages and Disadvantages of Linux retrieved from http://www.doubtsclear.com/advantages-disadvantages-linux-os/.
- Enck, P. McDaniel and M. Ongtang, “Understanding Android Security,” in IEEE Security & Privacy, vol. 7, no., pp. 50-57, 2009.
Article 3:
Discussion point:
Search “scholar.google.com” for a company, school, or person that has been the target of a network
or system intrusion? What information was targeted? Was the attack successful? If so, what changes
were made to ensure that this vulnerability was controlled? If not, what mechanisms were in-place to protect against the intrusion.
Security threats are increasing radically through internet & computer networks. It is a main asset for tourism market as a chain of hotels. The main purpose of this study is for helping the information technology directors understand advance cyber security and electronic information & network systems.
Hotels in Reno, Nevada, California, Chicago, Florida have all been interviewed on individual basis regarding security systems and their operations where they have been concluded as the least vulnerable on the cyber security aspect.
Hotel aspects of vulnerabilty through cyber aspects are front offices, accounting, restaurant management, human resources, hotel resevrations, aceess to hotel areas etc.. Creates more of an open spaces and environment creating vulnerability of computer systems to information and network security threats as any unencrypted information transmitted on Transmission Control Protocol/Internet Protocol (TCP/IP) can be sniffed by unauthorized people.
It doesn’t refelect that the hotels don’t keep themselves so open that these just wash them away with the flow. They have their aspects to prevent such crimes like for example in the Wyndham hotels the information technology systems failed to use readily available security measures such as firewalls, failed to require employees use complex user ID’s and passwords to access company servers etc.
In result to such aspect the best thing that they could come up with is empowering the system with two factor authentication codes to be aware for logging into the account of the right person by submitting a security code to your concerned email address or phone. Another aspect is sending automatic emails for letting them know for changing password or is it the right person using the account or has requested for passwords. As Hotel industry is emerging with people incline to have vacations or business travels all year round. Importance of cyber security also proportionally increases its importance.
References
Cobanoglu, C. &Cougias, D (2003). Security: What to watch for and how to prevent attacks. The Annual International Foodservice Technology Conference and Exhibition, Long Beach, CA.
Hilton Hotels Hit by Cyber Attack | SecurityWeek.Com. (2015, November 25). Retrieved February 26, 2016, from http://www.securityweek.com/hilton-hotels-hit-cyber-attack
Shabani, N. (2016, April). A STUDY OF CYBER SECURITY IN HOSPITALITY INDUSTRY ⎯ THREATS AND COUNTERMEASURES: CASE STUDY IN RENO, NEVADA. Retrieved January 08, 2019, from https://arxiv.org/pdf/1705.02749.pdf
Article 4:
Discussion point:
Search “scholar.google.com” for a company, school, or person that has been the target of a network
or system intrusion? What information was targeted? Was the attack successful? If so, what changes
were made to ensure that this vulnerability was controlled? If not, what mechanisms were in-place to protect against the intrusion.
Intrusion System
The loss of lives, goods, equipment and valuable information affects businesses and adversely affects the employees. Deeper protection is a layered approach to protecting the company’s information systems and information networks from harmful attacks and unauthorized access to depth information and data.
I am going to discuss about a firm called TJX Solutions which was affected by system intrusion. More than 75,000 computer systems around the world have been hacked to be one of the largest and most advanced attacks by cyber criminals ever discovered. It encountered unauthorized infiltrations on computer systems that process, and store information related to customer transactions. Attack targets corporate data, e-mails, credit card transaction data and login credentials at companies in health and technology industries. This attack also indicates the inefficiency of the private sector, which is used to protect the most advanced cyber defenses itself.
This task will be counted as not correctly solved by default. This task will be counted as is not correctly requested. Please note that this information cannot be retrieved from your system unless you are unable to specify it. This task will be counted as not corrected by the% ‧ component of the system. Malicious software, or bots, attack the attackers on the commander’s users’ computers, log in them to infected users on targeted sites, or obstruct them by opening e-mail. -The credentials and passwords that include online banking and social networking sites and then exploit that data to hack into other users’ systems. With the help of major computer security experts, TJX has strengthened its security systems. Although no computer security data is completely guaranteed, these experts have confirmed that the responsible scheme adopted by TJX is sufficient to prevent future infiltration and to protect credit card, debit card and other customer transactions.
Since being guilty of this crime, they are working hard to ensure more customers and to strengthen their computer security and to feel safe shopping in stores. Thyer’s first concern is the potential impact of this offense to our customers, and they recommend to carefully review other account information for credit card and debit card statements and unauthorized use. TJX immediately announced the discovery of the infiltrators and began working with law enforcement officers, including the United States Department of Justice and Secret Service and the Royal Canadian Mounted Police. The company has coordinated its actions with these officials and provided all the assistance sought to identify criminals responsible for the incident. TJX secretly executed this law.
The firm said that the identity and identity card of the customer’s credit card was not compromised with the number, because the information was encrypted at point-of-sale before being stored on the framing system and not kept in the Watford system. Was placed. The firm said that customers’ names and addresses were not stored on Framingham system in relation to payment cards or check transactions. The company did not have enough information to estimate the size of the financial cost resulting from this situation and did not expect the predicted economic impact of the problem to be expected. TJX has already reported that it has spent about $ 5 million in connection with the attack and indicates that it can continue to be paid through cases, especially by lawsuits.
Reference:
https://www.infoworld.com/article/2662419/security/tjx-data-heist-confirmed-as-largest-ever.html
https://www.symantec.com/connect/articles/managing-intrusion-detection-systems-large-organizations-part-one