SlideShare a Scribd company logo
1 of 10
Article 1:
Discussion point :
Topic: Computerized Operating Systems (OS) are almost
everywhere. We encounter them when we use out laptop or
desktop computer. We use them when we use our phone or
tablet. Find articles that describes the different types of
operating systems (Linux, Unix, Android, ROS, z/OS, z/VM,
z/VSE, etc). Do not select MS WINDOWS. Write a scholarly
review of comparing any two or more OS; attach a copy of the
article to your postings. Remember, this assignment is to be
scholarly; it is not enough for you to simply post your article
and add cursory reviews. Cited references are required.
Occupation of a working framework is to deal with all the
product and equipment on the PC, so fundamentally a large
portion of the in our PC there will be various projects will keep
running at once, all things considered there ought to be the
focal preparing unit(CPU) which will deal with the various
projects, and memory and capacity is likewise required to keep
up the various projects. Also, once more, in this kind of
situations the working framework will come into the image, and
facilitates with each program and ensure that each program get
it needs.
At that point we have diverse sorts of Operating frameworks,
and now a days in the event that you purchase the PC, the
working framework is the worked in programming in the
frameworks or in the PCs, so the general population who
purchase the PCs or the work areas will utilize the default
worked in working framework that accompanies the machine,
and furthermore there is plausibility of updating the working
framework. The most well-known working frameworks are MAC
OS X, and LINUX. In the directing working frameworks
individuals fundamentally utilize graphical UI or it is
additionally named as GUI, along these lines, essentially this
graphical UI will enable your mouse to tap the symbols, catches
and different menus, at whatever point you tap the progressions
will be unmistakably shown on the screen with the blend of the
designs and furthermore the content. At that point coming to
MAC OS X it is an inline working framework made by APPLE,
and the MAC OS X will have the default worked in Macintosh
PCs or MACs in it. What's more, the most recent adaptation of
the MAC OS will be OS X which can be articulated as (OS -
TEN), and the MAC OS prior forms are EI Capitan which was
discharged in 2015, Yosemite was discharged in 2014,
Mavericks was discharged in 2013, Mountain Lion was
discharged in 2012, and Lion was discharged in 2011. Be that as
it may, the level of MAC clients are less contrasted with the
windows clients, one reason is Macintosh PCs will in general be
more costly than that of windows pc's. At that point the LINUX
working framework, which has a place with the group of open-
source working framework. What's more, one of the upside of
the LINUX can be adjusted and dispersed by anybody on the
planet.
It a multi-show database encompassed and advance by Oracle
Corporation. It is one of the world's run of the mill databases
running system of endeavors, for instance, online exchange
overseeing, blended database extraordinary main jobs, and
database warehousing. Influencing execution with respect to
this database impacts its respect. This set the dimension of parts
and necessities that call for effective activities. In any case, a
poor use may offer moving to guaranteed wretchedness to the
data association framework. This joins net information harm
and information calamity that might be utilized particularly at
whatever point there is no great help structure.
Examples of working frameworks for PCs consolidate
Macintosh OS, Unix, and Linux. Minimal component of any
working framework is its bit. This is the foremost layer of
programming stacked into memory when a framework boots or
starts up. The portion offers access to various ordinary center
administrations to all other framework and application
programs. These administrations join, anyway are not limited
to: circle get to, memory the executives, undertaking booking,
and access to other equipment gadgets.
Reference:
Cashmore, M., Fox, M., Long, D., Magazzeni, D., Ridder, B.,
Carrera, A., ... & Carreras, M. (2015, June). ROSPlan: Planning
in the Robot Operating System. In ICAPS (pp. 333-34)
Kushwaha, A., & Kushwaha, V. (2011). Location based services
using android mobile operating system. International Journal of
Advances in Engineering & Technology, 1(1), 14.
Singh, P., Yadav, S., & Agrawal, S. (2015). A Brief Study on
Different Operating System. International Journal Of
Engineering And Computer Science., Vol.4, Iss.1, 1-3.
Article 2:
Discussion point :
Topic: Computerized Operating Systems (OS) are almost
everywhere. We encounter them when we use out laptop or
desktop computer. We use them when we use our phone or
tablet. Find articles that describes the different types of
operating systems (Linux, Unix, Android, ROS, z/OS, z/VM,
z/VSE, etc). Do not select MS WINDOWS. Write a scholarly
review of comparing any two or more OS; attach a copy of the
article to your postings. Remember, this assignment is to be
scholarly; it is not enough for you to simply post your article
and add cursory reviews. Cited references are required.
Linux might be an OS-like programming framework that was
made to blessing individual PC clients a basic or extremely
modest programming framework simply like normal and
ordinarily extra costly Unix tasks. UNIX envelops a character
as a greatly successful and quick performing watch. UNIX
stayed one among the chief ASCII content record advancements,
anyway numerous developers have another and answered bundle
that is completely ASCII content document for each client. It
proposes that you simply will exchange the approval code
conjointly alter it any vogue you wish. A few engineers have
confinements on anyway you'll have the capacity to share the
framework. for instance, a few designers adjust you to change
the framework, nonetheless, you can't share it for business.
UNIX is a working structure which was first made in the 1960s
and has been under clear change starting now and into the not
strikingly released. By working structure, we mean the suite of
endeavors which make the PC work. It is a stable, multi-
customer, playing out different assignments structure for
servers, work zones, and workstations.
UNIX structures other than having a graphical UI (GUI) like
Microsoft Windows which gives an easy to use condition. Unix
is a Full performing confining assignments by watched memory.
Specific customers can control clear undertakings all at the
inadequately delineated time without conflicting with some
other or breaking the strategy. Exceedingly staggering virtual
memory, such wearisome can work with a sensible number of
all around wrapped examinations. Access necessities and
prospering. All customers must check by a veritable record and
key to use the structure by any stretch of the creative centrality.
Heavenly constructed records have all records. The buyer can
pick whether others have seen or make the course to his data. A
strong system of little affiliations and affiliations that do
official obligations well - not tangled up by spaces of
remarkable rights. Unix is a particularly stacked contraption
stash, not a Titanic. Ability to string headings and affiliations
dependably in colossal ways to deal with oversee coordinate
control encourage reinforce control play out the not actually the
proportionate as befuddling commitments - not bound to
preconfigured blends or menus, as in private PC attempts. A by
and large that really matters bound together record change.
References :-
Bala, K. Sharma, S. & Kaur, G. (2015). A Study on Smartphone
based Operating System. International Journal of Computer
Applications, pp. 17-22.
Suresh Kuppan. (2016). Advantages and Disadvantages of Linux
retrieved from http://www.doubtsclear.com/advantages-
disadvantages-linux-os/.
W. Enck, P. McDaniel and M. Ongtang, "Understanding
Android Security," in IEEE Security & Privacy, vol. 7, no., pp.
50-57, 2009.
Article 3:
Discussion point:
Search "scholar.google.com" for a company, school, or person
that has been the target of a network
or system intrusion? What information was targeted? Was the
attack successful? If so, what changes
were made to ensure that this vulnerability was controlled? If
not, what mechanisms were in-place to protect against the
intrusion.
Security threats are increasing radically through internet &
computer networks. It is a main asset for tourism market as a
chain of hotels. The main purpose of this study is for helping
the information technology directors understand advance cyber
security and electronic information & network systems.
Hotels in Reno, Nevada, California, Chicago, Florida have all
been interviewed on individual basis regarding security
systems and their operations where they have been concluded as
the least vulnerable on the cyber security aspect.
Hotel aspects of vulnerabilty through cyber aspects are
front offices, accounting, restaurant management, human
resources, hotel resevrations, aceess to hotel areas etc.. Creates
more of an open spaces and environment creating vulnerability
of computer systems to information and network security threats
as any unencrypted information transmitted on Transmission
Control Protocol/Internet Protocol (TCP/IP) can be sniffed by
unauthorized people.
It doesn’t refelect that the hotels don’t keep themselves so open
that these just wash them away with the flow. They have their
aspects to prevent such crimes like for example in the Wyndham
hotels the information technology systems failed to
use readily available security measures such as firewalls, failed
to require employees use complex user ID’s and passwords
to access company servers etc.
In result to such aspect the best thing that they could come up
with is empowering the system with two factor authentication
codes to be aware for logging into the account of the right
person by submitting a security code to your concerned email
address or phone. Another aspect is sending automatic emails
for letting them know for changing password or is it the right
person using the account or has requested for passwords. As
Hotel industry is emerging with people incline to have vacations
or business travels all year round. Importance of cyber security
also proportionally increases its importance.
References
Cobanoglu, C. & Cougias, D (2003). Security: What to watch
for and how to prevent attacks. The Annual International
Foodservice Technology Conference and Exhibition, Long
Beach, CA.
Hilton Hotels Hit by Cyber Attack | SecurityWeek.Com. (2015,
November 25). Retrieved February 26, 2016,
from http://www.securityweek.com/hilton-hotels-hit-cyber-
attack
Shabani, N. (2016, April). A STUDY OF CYBER SECURITY
IN HOSPITALITY INDUSTRY ⎯
COUNTERMEASURES: CASE STUDY IN RENO, NEVADA.
Retrieved January 08, 2019, from
https://arxiv.org/pdf/1705.02749.pdf
Article 4:
Discussion point:
Search "scholar.google.com" for a company, school, or person
that has been the target of a network
or system intrusion? What information was targeted? Was the
attack successful? If so, what changes
were made to ensure that this vulnerability was controlled? If
not, what mechanisms were in-place to protect against the
intrusion.
Intrusion System
The loss of lives, goods, equipment and valuable information
affects businesses and adversely affects the employees. Deeper
protection is a layered approach to protecting the company's
information systems and information networks from harmful
attacks and unauthorized access to depth information and data.
I am going to discuss about a firm called TJX
Solution
s which was affected by system intrusion. More than 75,000
computer systems around the world have been hacked to be one
of the largest and most advanced attacks by cyber criminals
ever discovered. It encountered unauthorized infiltrations on
computer systems that process, and store information related to
customer transactions. Attack targets corporate data, e-mails,
credit card transaction data and login credentials at companies
in health and technology industries. This attack also indicates
the inefficiency of the private sector, which is used to protect
the most advanced cyber defenses itself.
This task will be counted as not correctly solved by default.
This task will be counted as is not correctly requested. Please
note that this information cannot be retrieved from your system
unless you are unable to specify it. This task will be counted as
not corrected by the% ‧ component of the system. Malicious
software, or bots, attack the attackers on the commander's users'
computers, log in them to infected users on targeted sites, or
obstruct them by opening e-mail. -The credentials and
passwords that include online banking and social networking
sites and then exploit that data to hack into other users' systems.
With the help of major computer security experts, TJX has
strengthened its security systems. Although no computer
security data is completely guaranteed, these experts have
confirmed that the responsible scheme adopted by TJX is
sufficient to prevent future infiltration and to protect credit
card, debit card and other customer transactions.
Since being guilty of this crime, they are working hard to
ensure more customers and to strengthen their computer security
and to feel safe shopping in stores. Thyer’s first concern is the
potential impact of this offense to our customers, and they
recommend to carefully review other account information for
credit card and debit card statements and unauthorized use. TJX
immediately announced the discovery of the infiltrators and
began working with law enforcement officers, including the
United States Department of Justice and Secret Service and the
Royal Canadian Mounted Police. The company has coordinated
its actions with these officials and provided all the assistance
sought to identify criminals responsible for the incident. TJX
secretly executed this law.
The firm said that the identity and identity card of the
customer's credit card was not compromised with the number,
because the information was encrypted at point-of-sale before
being stored on the framing system and not kept in the Watford
system. Was placed. The firm said that customers' names and
addresses were not stored on Framingham system in relation to
payment cards or check transactions. The company did not have
enough information to estimate the size of the financial cost
resulting from this situation and did not expect the predicted
economic impact of the problem to be expected. TJX has
already reported that it has spent about $ 5 million in
connection with the attack and indicates that it can continue to
be paid through cases, especially by lawsuits.
Reference:
https://www.infoworld.com/article/2662419/security/tjx-data-
heist-confirmed-as-largest-ever.html
https://www.symantec.com/connect/articles/managing-intrusion-
detection-systems-large-organizations-part-one

More Related Content

Similar to Article 1Discussion point Topic Computerized Operating Syst.docx

ENG 102 Unit Six Page 1 of 1 ENG 102 Composition II .docx
ENG 102 Unit Six Page 1 of 1  ENG 102 Composition II  .docxENG 102 Unit Six Page 1 of 1  ENG 102 Composition II  .docx
ENG 102 Unit Six Page 1 of 1 ENG 102 Composition II .docxSALU18
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Features Of A Operating System
Features Of A Operating SystemFeatures Of A Operating System
Features Of A Operating SystemAlexis Naranjo
 
Running Head WINDOWS AND LINUX 1WINDOWS AND LINUX12.docx
Running Head WINDOWS AND LINUX     1WINDOWS AND LINUX12.docxRunning Head WINDOWS AND LINUX     1WINDOWS AND LINUX12.docx
Running Head WINDOWS AND LINUX 1WINDOWS AND LINUX12.docxjeffsrosalyn
 
Discussion # 6Operating-System StructureA system as large an.docx
Discussion # 6Operating-System StructureA system as large an.docxDiscussion # 6Operating-System StructureA system as large an.docx
Discussion # 6Operating-System StructureA system as large an.docxlynettearnold46882
 
Comparisons And Contrasts Of Windows Ce, Windows Xp, And...
Comparisons And Contrasts Of Windows Ce, Windows Xp, And...Comparisons And Contrasts Of Windows Ce, Windows Xp, And...
Comparisons And Contrasts Of Windows Ce, Windows Xp, And...Cecilia Lucero
 
11.1 IntroductionLEARNING OBJECTIVESRecognize the importance.docx
11.1 IntroductionLEARNING OBJECTIVESRecognize the importance.docx11.1 IntroductionLEARNING OBJECTIVESRecognize the importance.docx
11.1 IntroductionLEARNING OBJECTIVESRecognize the importance.docxpaynetawnya
 
209979479 study-material
209979479 study-material209979479 study-material
209979479 study-materialhomeworkping8
 

Similar to Article 1Discussion point Topic Computerized Operating Syst.docx (12)

ENG 102 Unit Six Page 1 of 1 ENG 102 Composition II .docx
ENG 102 Unit Six Page 1 of 1  ENG 102 Composition II  .docxENG 102 Unit Six Page 1 of 1  ENG 102 Composition II  .docx
ENG 102 Unit Six Page 1 of 1 ENG 102 Composition II .docx
 
Operating system
Operating systemOperating system
Operating system
 
Characteristic & Aplication of some popular operating system.
Characteristic & Aplication of some popular operating system.Characteristic & Aplication of some popular operating system.
Characteristic & Aplication of some popular operating system.
 
Operating System PPT
Operating System PPTOperating System PPT
Operating System PPT
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Features Of A Operating System
Features Of A Operating SystemFeatures Of A Operating System
Features Of A Operating System
 
Running Head WINDOWS AND LINUX 1WINDOWS AND LINUX12.docx
Running Head WINDOWS AND LINUX     1WINDOWS AND LINUX12.docxRunning Head WINDOWS AND LINUX     1WINDOWS AND LINUX12.docx
Running Head WINDOWS AND LINUX 1WINDOWS AND LINUX12.docx
 
OPERATING SYSTEM
OPERATING SYSTEMOPERATING SYSTEM
OPERATING SYSTEM
 
Discussion # 6Operating-System StructureA system as large an.docx
Discussion # 6Operating-System StructureA system as large an.docxDiscussion # 6Operating-System StructureA system as large an.docx
Discussion # 6Operating-System StructureA system as large an.docx
 
Comparisons And Contrasts Of Windows Ce, Windows Xp, And...
Comparisons And Contrasts Of Windows Ce, Windows Xp, And...Comparisons And Contrasts Of Windows Ce, Windows Xp, And...
Comparisons And Contrasts Of Windows Ce, Windows Xp, And...
 
11.1 IntroductionLEARNING OBJECTIVESRecognize the importance.docx
11.1 IntroductionLEARNING OBJECTIVESRecognize the importance.docx11.1 IntroductionLEARNING OBJECTIVESRecognize the importance.docx
11.1 IntroductionLEARNING OBJECTIVESRecognize the importance.docx
 
209979479 study-material
209979479 study-material209979479 study-material
209979479 study-material
 

More from rossskuddershamus

As a human resources manager, you need to advise top leadership (CEO.docx
As a human resources manager, you need to advise top leadership (CEO.docxAs a human resources manager, you need to advise top leadership (CEO.docx
As a human resources manager, you need to advise top leadership (CEO.docxrossskuddershamus
 
As a homeowner, you have become more concerned about the energy is.docx
As a homeowner, you have become more concerned about the energy is.docxAs a homeowner, you have become more concerned about the energy is.docx
As a homeowner, you have become more concerned about the energy is.docxrossskuddershamus
 
As a healthcare professional, you will be working closely with o.docx
As a healthcare professional, you will be working closely with o.docxAs a healthcare professional, you will be working closely with o.docx
As a healthcare professional, you will be working closely with o.docxrossskuddershamus
 
As a future teacher exposed to the rising trend of blogs and adv.docx
As a future teacher exposed to the rising trend of blogs and adv.docxAs a future teacher exposed to the rising trend of blogs and adv.docx
As a future teacher exposed to the rising trend of blogs and adv.docxrossskuddershamus
 
As a fresh research intern, you are a part of the hypothetical.docx
As a fresh research intern, you are a part of the hypothetical.docxAs a fresh research intern, you are a part of the hypothetical.docx
As a fresh research intern, you are a part of the hypothetical.docxrossskuddershamus
 
As a fresh research intern, you are a part of the hypothetical Nat.docx
As a fresh research intern, you are a part of the hypothetical Nat.docxAs a fresh research intern, you are a part of the hypothetical Nat.docx
As a fresh research intern, you are a part of the hypothetical Nat.docxrossskuddershamus
 
As a former emergency department Registered Nurse for over seven.docx
As a former emergency department Registered Nurse for over seven.docxAs a former emergency department Registered Nurse for over seven.docx
As a former emergency department Registered Nurse for over seven.docxrossskuddershamus
 
As a doctorally prepared nurse, you are writing a Continuous Qua.docx
As a doctorally prepared nurse, you are writing a Continuous Qua.docxAs a doctorally prepared nurse, you are writing a Continuous Qua.docx
As a doctorally prepared nurse, you are writing a Continuous Qua.docxrossskuddershamus
 
As a consumer of information, do you generally look for objectivity .docx
As a consumer of information, do you generally look for objectivity .docxAs a consumer of information, do you generally look for objectivity .docx
As a consumer of information, do you generally look for objectivity .docxrossskuddershamus
 
As a center of intellectual life and learning, Timbuktua. had ver.docx
As a center of intellectual life and learning, Timbuktua. had ver.docxAs a center of intellectual life and learning, Timbuktua. had ver.docx
As a center of intellectual life and learning, Timbuktua. had ver.docxrossskuddershamus
 
ary AssignmentCertified medical administrative assistants (CMAAs) .docx
ary AssignmentCertified medical administrative assistants (CMAAs) .docxary AssignmentCertified medical administrative assistants (CMAAs) .docx
ary AssignmentCertified medical administrative assistants (CMAAs) .docxrossskuddershamus
 
As (or after) you read The Declaration of Independence, identify.docx
As (or after) you read The Declaration of Independence, identify.docxAs (or after) you read The Declaration of Independence, identify.docx
As (or after) you read The Declaration of Independence, identify.docxrossskuddershamus
 
ARTWORK Markus Linnenbrink HOWTOSURVIVE, 2012, epoxy resin .docx
ARTWORK Markus Linnenbrink HOWTOSURVIVE, 2012, epoxy resin  .docxARTWORK Markus Linnenbrink HOWTOSURVIVE, 2012, epoxy resin  .docx
ARTWORK Markus Linnenbrink HOWTOSURVIVE, 2012, epoxy resin .docxrossskuddershamus
 
AS 4678—2002www.standards.com.au © Standards Australia .docx
AS 4678—2002www.standards.com.au © Standards Australia .docxAS 4678—2002www.standards.com.au © Standards Australia .docx
AS 4678—2002www.standards.com.au © Standards Australia .docxrossskuddershamus
 
arugumentative essay on article given belowIn Parents Keep Chil.docx
arugumentative essay on article given belowIn Parents Keep Chil.docxarugumentative essay on article given belowIn Parents Keep Chil.docx
arugumentative essay on article given belowIn Parents Keep Chil.docxrossskuddershamus
 
artsArticleCircling Round Vitruvius, Linear Perspectiv.docx
artsArticleCircling Round Vitruvius, Linear Perspectiv.docxartsArticleCircling Round Vitruvius, Linear Perspectiv.docx
artsArticleCircling Round Vitruvius, Linear Perspectiv.docxrossskuddershamus
 
ARTS & NATURE MARKETING PROJECT OF SHEFFIELDYang yux.docx
ARTS & NATURE MARKETING PROJECT OF SHEFFIELDYang yux.docxARTS & NATURE MARKETING PROJECT OF SHEFFIELDYang yux.docx
ARTS & NATURE MARKETING PROJECT OF SHEFFIELDYang yux.docxrossskuddershamus
 
ARTIGO ORIGINALRevista Cient.docx
ARTIGO ORIGINALRevista Cient.docxARTIGO ORIGINALRevista Cient.docx
ARTIGO ORIGINALRevista Cient.docxrossskuddershamus
 
Artist Analysis Project – Due Week 61)Powerpoint project at le.docx
Artist Analysis Project – Due Week 61)Powerpoint project at le.docxArtist Analysis Project – Due Week 61)Powerpoint project at le.docx
Artist Analysis Project – Due Week 61)Powerpoint project at le.docxrossskuddershamus
 
Artist Research Paper RequirementsYou are to write a 3 page double.docx
Artist Research Paper RequirementsYou are to write a 3 page double.docxArtist Research Paper RequirementsYou are to write a 3 page double.docx
Artist Research Paper RequirementsYou are to write a 3 page double.docxrossskuddershamus
 

More from rossskuddershamus (20)

As a human resources manager, you need to advise top leadership (CEO.docx
As a human resources manager, you need to advise top leadership (CEO.docxAs a human resources manager, you need to advise top leadership (CEO.docx
As a human resources manager, you need to advise top leadership (CEO.docx
 
As a homeowner, you have become more concerned about the energy is.docx
As a homeowner, you have become more concerned about the energy is.docxAs a homeowner, you have become more concerned about the energy is.docx
As a homeowner, you have become more concerned about the energy is.docx
 
As a healthcare professional, you will be working closely with o.docx
As a healthcare professional, you will be working closely with o.docxAs a healthcare professional, you will be working closely with o.docx
As a healthcare professional, you will be working closely with o.docx
 
As a future teacher exposed to the rising trend of blogs and adv.docx
As a future teacher exposed to the rising trend of blogs and adv.docxAs a future teacher exposed to the rising trend of blogs and adv.docx
As a future teacher exposed to the rising trend of blogs and adv.docx
 
As a fresh research intern, you are a part of the hypothetical.docx
As a fresh research intern, you are a part of the hypothetical.docxAs a fresh research intern, you are a part of the hypothetical.docx
As a fresh research intern, you are a part of the hypothetical.docx
 
As a fresh research intern, you are a part of the hypothetical Nat.docx
As a fresh research intern, you are a part of the hypothetical Nat.docxAs a fresh research intern, you are a part of the hypothetical Nat.docx
As a fresh research intern, you are a part of the hypothetical Nat.docx
 
As a former emergency department Registered Nurse for over seven.docx
As a former emergency department Registered Nurse for over seven.docxAs a former emergency department Registered Nurse for over seven.docx
As a former emergency department Registered Nurse for over seven.docx
 
As a doctorally prepared nurse, you are writing a Continuous Qua.docx
As a doctorally prepared nurse, you are writing a Continuous Qua.docxAs a doctorally prepared nurse, you are writing a Continuous Qua.docx
As a doctorally prepared nurse, you are writing a Continuous Qua.docx
 
As a consumer of information, do you generally look for objectivity .docx
As a consumer of information, do you generally look for objectivity .docxAs a consumer of information, do you generally look for objectivity .docx
As a consumer of information, do you generally look for objectivity .docx
 
As a center of intellectual life and learning, Timbuktua. had ver.docx
As a center of intellectual life and learning, Timbuktua. had ver.docxAs a center of intellectual life and learning, Timbuktua. had ver.docx
As a center of intellectual life and learning, Timbuktua. had ver.docx
 
ary AssignmentCertified medical administrative assistants (CMAAs) .docx
ary AssignmentCertified medical administrative assistants (CMAAs) .docxary AssignmentCertified medical administrative assistants (CMAAs) .docx
ary AssignmentCertified medical administrative assistants (CMAAs) .docx
 
As (or after) you read The Declaration of Independence, identify.docx
As (or after) you read The Declaration of Independence, identify.docxAs (or after) you read The Declaration of Independence, identify.docx
As (or after) you read The Declaration of Independence, identify.docx
 
ARTWORK Markus Linnenbrink HOWTOSURVIVE, 2012, epoxy resin .docx
ARTWORK Markus Linnenbrink HOWTOSURVIVE, 2012, epoxy resin  .docxARTWORK Markus Linnenbrink HOWTOSURVIVE, 2012, epoxy resin  .docx
ARTWORK Markus Linnenbrink HOWTOSURVIVE, 2012, epoxy resin .docx
 
AS 4678—2002www.standards.com.au © Standards Australia .docx
AS 4678—2002www.standards.com.au © Standards Australia .docxAS 4678—2002www.standards.com.au © Standards Australia .docx
AS 4678—2002www.standards.com.au © Standards Australia .docx
 
arugumentative essay on article given belowIn Parents Keep Chil.docx
arugumentative essay on article given belowIn Parents Keep Chil.docxarugumentative essay on article given belowIn Parents Keep Chil.docx
arugumentative essay on article given belowIn Parents Keep Chil.docx
 
artsArticleCircling Round Vitruvius, Linear Perspectiv.docx
artsArticleCircling Round Vitruvius, Linear Perspectiv.docxartsArticleCircling Round Vitruvius, Linear Perspectiv.docx
artsArticleCircling Round Vitruvius, Linear Perspectiv.docx
 
ARTS & NATURE MARKETING PROJECT OF SHEFFIELDYang yux.docx
ARTS & NATURE MARKETING PROJECT OF SHEFFIELDYang yux.docxARTS & NATURE MARKETING PROJECT OF SHEFFIELDYang yux.docx
ARTS & NATURE MARKETING PROJECT OF SHEFFIELDYang yux.docx
 
ARTIGO ORIGINALRevista Cient.docx
ARTIGO ORIGINALRevista Cient.docxARTIGO ORIGINALRevista Cient.docx
ARTIGO ORIGINALRevista Cient.docx
 
Artist Analysis Project – Due Week 61)Powerpoint project at le.docx
Artist Analysis Project – Due Week 61)Powerpoint project at le.docxArtist Analysis Project – Due Week 61)Powerpoint project at le.docx
Artist Analysis Project – Due Week 61)Powerpoint project at le.docx
 
Artist Research Paper RequirementsYou are to write a 3 page double.docx
Artist Research Paper RequirementsYou are to write a 3 page double.docxArtist Research Paper RequirementsYou are to write a 3 page double.docx
Artist Research Paper RequirementsYou are to write a 3 page double.docx
 

Recently uploaded

Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 

Recently uploaded (20)

Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 

Article 1Discussion point Topic Computerized Operating Syst.docx

  • 1. Article 1: Discussion point : Topic: Computerized Operating Systems (OS) are almost everywhere. We encounter them when we use out laptop or desktop computer. We use them when we use our phone or tablet. Find articles that describes the different types of operating systems (Linux, Unix, Android, ROS, z/OS, z/VM, z/VSE, etc). Do not select MS WINDOWS. Write a scholarly review of comparing any two or more OS; attach a copy of the article to your postings. Remember, this assignment is to be scholarly; it is not enough for you to simply post your article and add cursory reviews. Cited references are required. Occupation of a working framework is to deal with all the product and equipment on the PC, so fundamentally a large portion of the in our PC there will be various projects will keep running at once, all things considered there ought to be the focal preparing unit(CPU) which will deal with the various projects, and memory and capacity is likewise required to keep up the various projects. Also, once more, in this kind of situations the working framework will come into the image, and facilitates with each program and ensure that each program get it needs. At that point we have diverse sorts of Operating frameworks, and now a days in the event that you purchase the PC, the working framework is the worked in programming in the frameworks or in the PCs, so the general population who purchase the PCs or the work areas will utilize the default worked in working framework that accompanies the machine, and furthermore there is plausibility of updating the working framework. The most well-known working frameworks are MAC OS X, and LINUX. In the directing working frameworks individuals fundamentally utilize graphical UI or it is
  • 2. additionally named as GUI, along these lines, essentially this graphical UI will enable your mouse to tap the symbols, catches and different menus, at whatever point you tap the progressions will be unmistakably shown on the screen with the blend of the designs and furthermore the content. At that point coming to MAC OS X it is an inline working framework made by APPLE, and the MAC OS X will have the default worked in Macintosh PCs or MACs in it. What's more, the most recent adaptation of the MAC OS will be OS X which can be articulated as (OS - TEN), and the MAC OS prior forms are EI Capitan which was discharged in 2015, Yosemite was discharged in 2014, Mavericks was discharged in 2013, Mountain Lion was discharged in 2012, and Lion was discharged in 2011. Be that as it may, the level of MAC clients are less contrasted with the windows clients, one reason is Macintosh PCs will in general be more costly than that of windows pc's. At that point the LINUX working framework, which has a place with the group of open- source working framework. What's more, one of the upside of the LINUX can be adjusted and dispersed by anybody on the planet. It a multi-show database encompassed and advance by Oracle Corporation. It is one of the world's run of the mill databases running system of endeavors, for instance, online exchange overseeing, blended database extraordinary main jobs, and database warehousing. Influencing execution with respect to this database impacts its respect. This set the dimension of parts and necessities that call for effective activities. In any case, a poor use may offer moving to guaranteed wretchedness to the data association framework. This joins net information harm and information calamity that might be utilized particularly at whatever point there is no great help structure. Examples of working frameworks for PCs consolidate Macintosh OS, Unix, and Linux. Minimal component of any working framework is its bit. This is the foremost layer of programming stacked into memory when a framework boots or starts up. The portion offers access to various ordinary center
  • 3. administrations to all other framework and application programs. These administrations join, anyway are not limited to: circle get to, memory the executives, undertaking booking, and access to other equipment gadgets. Reference: Cashmore, M., Fox, M., Long, D., Magazzeni, D., Ridder, B., Carrera, A., ... & Carreras, M. (2015, June). ROSPlan: Planning in the Robot Operating System. In ICAPS (pp. 333-34) Kushwaha, A., & Kushwaha, V. (2011). Location based services using android mobile operating system. International Journal of Advances in Engineering & Technology, 1(1), 14. Singh, P., Yadav, S., & Agrawal, S. (2015). A Brief Study on Different Operating System. International Journal Of Engineering And Computer Science., Vol.4, Iss.1, 1-3. Article 2: Discussion point : Topic: Computerized Operating Systems (OS) are almost everywhere. We encounter them when we use out laptop or desktop computer. We use them when we use our phone or tablet. Find articles that describes the different types of operating systems (Linux, Unix, Android, ROS, z/OS, z/VM, z/VSE, etc). Do not select MS WINDOWS. Write a scholarly review of comparing any two or more OS; attach a copy of the article to your postings. Remember, this assignment is to be scholarly; it is not enough for you to simply post your article and add cursory reviews. Cited references are required. Linux might be an OS-like programming framework that was made to blessing individual PC clients a basic or extremely modest programming framework simply like normal and ordinarily extra costly Unix tasks. UNIX envelops a character
  • 4. as a greatly successful and quick performing watch. UNIX stayed one among the chief ASCII content record advancements, anyway numerous developers have another and answered bundle that is completely ASCII content document for each client. It proposes that you simply will exchange the approval code conjointly alter it any vogue you wish. A few engineers have confinements on anyway you'll have the capacity to share the framework. for instance, a few designers adjust you to change the framework, nonetheless, you can't share it for business. UNIX is a working structure which was first made in the 1960s and has been under clear change starting now and into the not strikingly released. By working structure, we mean the suite of endeavors which make the PC work. It is a stable, multi- customer, playing out different assignments structure for servers, work zones, and workstations. UNIX structures other than having a graphical UI (GUI) like Microsoft Windows which gives an easy to use condition. Unix is a Full performing confining assignments by watched memory. Specific customers can control clear undertakings all at the inadequately delineated time without conflicting with some other or breaking the strategy. Exceedingly staggering virtual memory, such wearisome can work with a sensible number of all around wrapped examinations. Access necessities and prospering. All customers must check by a veritable record and key to use the structure by any stretch of the creative centrality. Heavenly constructed records have all records. The buyer can pick whether others have seen or make the course to his data. A strong system of little affiliations and affiliations that do official obligations well - not tangled up by spaces of remarkable rights. Unix is a particularly stacked contraption stash, not a Titanic. Ability to string headings and affiliations dependably in colossal ways to deal with oversee coordinate control encourage reinforce control play out the not actually the proportionate as befuddling commitments - not bound to
  • 5. preconfigured blends or menus, as in private PC attempts. A by and large that really matters bound together record change. References :- Bala, K. Sharma, S. & Kaur, G. (2015). A Study on Smartphone based Operating System. International Journal of Computer Applications, pp. 17-22. Suresh Kuppan. (2016). Advantages and Disadvantages of Linux retrieved from http://www.doubtsclear.com/advantages- disadvantages-linux-os/. W. Enck, P. McDaniel and M. Ongtang, "Understanding Android Security," in IEEE Security & Privacy, vol. 7, no., pp. 50-57, 2009. Article 3: Discussion point: Search "scholar.google.com" for a company, school, or person that has been the target of a network or system intrusion? What information was targeted? Was the attack successful? If so, what changes were made to ensure that this vulnerability was controlled? If not, what mechanisms were in-place to protect against the intrusion. Security threats are increasing radically through internet & computer networks. It is a main asset for tourism market as a chain of hotels. The main purpose of this study is for helping the information technology directors understand advance cyber security and electronic information & network systems. Hotels in Reno, Nevada, California, Chicago, Florida have all been interviewed on individual basis regarding security systems and their operations where they have been concluded as
  • 6. the least vulnerable on the cyber security aspect. Hotel aspects of vulnerabilty through cyber aspects are front offices, accounting, restaurant management, human resources, hotel resevrations, aceess to hotel areas etc.. Creates more of an open spaces and environment creating vulnerability of computer systems to information and network security threats as any unencrypted information transmitted on Transmission Control Protocol/Internet Protocol (TCP/IP) can be sniffed by unauthorized people. It doesn’t refelect that the hotels don’t keep themselves so open that these just wash them away with the flow. They have their aspects to prevent such crimes like for example in the Wyndham hotels the information technology systems failed to use readily available security measures such as firewalls, failed to require employees use complex user ID’s and passwords to access company servers etc. In result to such aspect the best thing that they could come up with is empowering the system with two factor authentication codes to be aware for logging into the account of the right person by submitting a security code to your concerned email address or phone. Another aspect is sending automatic emails for letting them know for changing password or is it the right person using the account or has requested for passwords. As Hotel industry is emerging with people incline to have vacations or business travels all year round. Importance of cyber security also proportionally increases its importance. References Cobanoglu, C. & Cougias, D (2003). Security: What to watch for and how to prevent attacks. The Annual International Foodservice Technology Conference and Exhibition, Long Beach, CA. Hilton Hotels Hit by Cyber Attack | SecurityWeek.Com. (2015, November 25). Retrieved February 26, 2016, from http://www.securityweek.com/hilton-hotels-hit-cyber- attack Shabani, N. (2016, April). A STUDY OF CYBER SECURITY
  • 7. IN HOSPITALITY INDUSTRY ⎯ COUNTERMEASURES: CASE STUDY IN RENO, NEVADA. Retrieved January 08, 2019, from https://arxiv.org/pdf/1705.02749.pdf Article 4: Discussion point: Search "scholar.google.com" for a company, school, or person that has been the target of a network or system intrusion? What information was targeted? Was the attack successful? If so, what changes were made to ensure that this vulnerability was controlled? If not, what mechanisms were in-place to protect against the intrusion. Intrusion System The loss of lives, goods, equipment and valuable information affects businesses and adversely affects the employees. Deeper protection is a layered approach to protecting the company's information systems and information networks from harmful attacks and unauthorized access to depth information and data. I am going to discuss about a firm called TJX Solution s which was affected by system intrusion. More than 75,000 computer systems around the world have been hacked to be one of the largest and most advanced attacks by cyber criminals
  • 8. ever discovered. It encountered unauthorized infiltrations on computer systems that process, and store information related to customer transactions. Attack targets corporate data, e-mails, credit card transaction data and login credentials at companies in health and technology industries. This attack also indicates the inefficiency of the private sector, which is used to protect the most advanced cyber defenses itself. This task will be counted as not correctly solved by default. This task will be counted as is not correctly requested. Please note that this information cannot be retrieved from your system unless you are unable to specify it. This task will be counted as not corrected by the% ‧ component of the system. Malicious software, or bots, attack the attackers on the commander's users' computers, log in them to infected users on targeted sites, or obstruct them by opening e-mail. -The credentials and passwords that include online banking and social networking sites and then exploit that data to hack into other users' systems. With the help of major computer security experts, TJX has strengthened its security systems. Although no computer security data is completely guaranteed, these experts have confirmed that the responsible scheme adopted by TJX is sufficient to prevent future infiltration and to protect credit card, debit card and other customer transactions.
  • 9. Since being guilty of this crime, they are working hard to ensure more customers and to strengthen their computer security and to feel safe shopping in stores. Thyer’s first concern is the potential impact of this offense to our customers, and they recommend to carefully review other account information for credit card and debit card statements and unauthorized use. TJX immediately announced the discovery of the infiltrators and began working with law enforcement officers, including the United States Department of Justice and Secret Service and the Royal Canadian Mounted Police. The company has coordinated its actions with these officials and provided all the assistance sought to identify criminals responsible for the incident. TJX secretly executed this law. The firm said that the identity and identity card of the customer's credit card was not compromised with the number, because the information was encrypted at point-of-sale before being stored on the framing system and not kept in the Watford system. Was placed. The firm said that customers' names and addresses were not stored on Framingham system in relation to payment cards or check transactions. The company did not have enough information to estimate the size of the financial cost resulting from this situation and did not expect the predicted economic impact of the problem to be expected. TJX has already reported that it has spent about $ 5 million in
  • 10. connection with the attack and indicates that it can continue to be paid through cases, especially by lawsuits. Reference: https://www.infoworld.com/article/2662419/security/tjx-data- heist-confirmed-as-largest-ever.html https://www.symantec.com/connect/articles/managing-intrusion- detection-systems-large-organizations-part-one