Sunday, February 16, 2020

IT infrastructure security Term Paper Example | Topics and Well Written Essays - 2000 words

IT infrastructure security - Term Paper Example The workstation is a desktop PC and is at the study den in the home. It is predominantly used for sending and receiving e-mail, writing and printing papers, surfing the internet, making computer drawings or art, create and publish Website pages, creating graphs charts for coursework and gaming. In terms of the processing power, it has a dual-core processor, 3 GB of R.A.M, Windows XP operating system and hard drive storage of 160 GB. The home computer might be a popular target for intruders who are curious to find out what you have stored in the workstation. They look for bank account information, credit card numbers and anything confidential and worth some amount they can find. For a home computer, the intruders are not just interested in the money-related information; they also want the workstations resources. This refers to the fast processor, hard disk space, and the internet connection. They can then use these resources to attack other computers on the internet. As a matter of fa ct, the more computers a hacker compromises, the harder it is for the authorities to trace the origin of the attack. Following this, if intruders cannot be traced, they cannot be stopped and they cannot be prosecuted.Intruders pay attention to home computers for some obvious reasons. First, the home computers are basically easy to break into and are not secure. When combined high-bandwidth connections are turned on, hackers can quickly find and exploit the security vulnerabilities of the home computers.... In terms of the processing power, it has a dual core processor, 3 GB of R.A.M, windows Xp operating system and hard drive storage of 160 GB. The home computer might be a popular target for intruders who are curious to find out what you have stored in the workstation. They look for bank account information, credit card numbers and anything confidential and worth some amount they can find. After stealing your information, the intruders can use the money to buy goods and services. For a home computer, the intruders are not just interested in the money-related information; they also want the workstations resources. This refers to the fast processor, hard disk space and the internet connection. They can then use these resources to attack other computers on the internet. As a matter of fact, the more computers a hacker compromises, the harder it is for the authorities to trace the origin of the attack. Following this, if intruders cannot be traced, they cannot be stopped and they cannot be prosecuted. Intruders pay attention to home computers for some obvious reasons. First, the home computers are basically easy to break into and are not secure. When combined high-bandwidth connections are turned on, hackers can quickly find and exploit the security vulnerabilities of the home computers. In the attack, intruders will prefer workstations attached to high-speed connections, DSL modems and cable modems to dial-in connections. Regardless of the home computer’s internet connection, the intruders’ attempts are often successful. A lot of home PC owners do not know that they need to consider their home computers security. Network security perspective In the past security threats came

Sunday, February 2, 2020

Transpower Assignment Example | Topics and Well Written Essays - 3500 words

Transpower - Assignment Example This analysis comes in the wake of an announcement from the New Zealand government, for instance, that there had been an allocation in the amount of $4.6 billion for the upgrading of the national power grid over the course of the next ten years, beginning in 2012, with the key purpose of the investments being the modernization of the grid and the setting up of infrastructure to ready the country for future increases in power consumption and demand. This fund is also earmarked to likewise improve reliability of power supply to consumers, both industrial and residential. On the other hand, the investment plan also takes a shot at the current state of generation and transmission in New Zealand, where generation facilities are centralized, and necessitate the kind of transmission infrastructure investments that could be limited and reduced by investing more in distributed generation moving forward. The idea is that transmission investments are not etched in stone as necessary, if generat ion is distributed, and if such facilities are located close to the demand. Where this becomes a reality, then there is a reduced need to build large generation facilities and the necessary transmission infrastructure needed to pipe the power to the consumers (Sustainable Energy Association, 2012). II. Transmission Upgrade Projects Are On-going and Massive The investment in additional grid infrastructure, in particular new transmission lines capabilities/capacities on top of the existing infrastructure, or as an addition to that, has been on-going, with the total capital outlay for those projects slated at $5 billion over the next ten years, as estimated by Transpower itself, and broken down into a number of key infrastructure projects, some on-going, and with varying completion dates. The key projects are said to be one, the upgrading of the transmission grid in the North Island, which is intended to erect a new link for transmitting power between Auckland and Whakamaru; two, upgra ding of the transmission link between Northland and North Auckland, which entails putting up a 220 kV infrastructure link as well as two substations; three, the replacement of the pole used to link different islands in New Zealand via HVDC, specifically Pole 1; and four, the erection of a new transmission infrastructure between Whakamaru and Wairakei, that will be double-circuited (Transpower, 2012). The upgrading of the whole grid in the North Island is said to be among the largest of the current crop of on-going projects, with project completion slated in 2012, and