most suitable file system according to my opinion and options is the ext4 file system. There are various reasons which make this files system more suitable for Linux. Being an extension to ext3, this file system has added performance improvements, with a better design, reliability and extended storage units. The ext4 can support storage with sizes of up to 1 exbibyte (EiB) with singles sizes of 16 tebibytes (TiB) which translates to 17.6 terabytes, bigger than any hard drive available. It uses the allocate-on-flush performance technique. A single extend can map 128 Mib of space with a 4 KiB block size (Salter, 2018). The traditional block mapping scheme in ext2 and ext3 have been replaced with Extents. Ext4 does not constrict the number of sub directories in a single directory. Ext4 can pre-allocate disk space for a file. The combination of these features makes this file system more advanced, efficient and highly reliable.
One of the advantages of ext4 is that it uses different LUNS/disks. This increases the performance of the data base since you have the transaction on storage and data files on another. Additionally, you can choose different mount options which increase the security. Secondly, you can manage space by allocation/. This enables you to have nasty applications which feel up space which is not affecting other applications. Fragmentation of one partition depends on the other. Thirdly, using ext4, you can mount or dismount, snapshot, format and monitor for the performance of file systems independently. You can mount volumes by demand and also have encryption on specific volumes.
In order to analyze the suitability of the ext4 file system with Linux, I compared the pros and cons of ext4 to other common file systems. The first comparison was between ext4 against ext3 and ex2. To start with, ext2 does not contain the journaling feature, ext3 supports journaling whereas ext4 supports the total file system size and huge individual size. In ext2, the maximum individual file size ranges from 16 GB to 2 TB, ext3 maximum individual file ranges from 16 to 2 TB while that of ext 4 ranges from 16 GB to 16 TB (Salter, 2018). The overall file size of both ext2 and ext3 file system ranges from 2 to 32 TB while that of ext4 is 1 EiB which converts to 1024*1024 TB. This analysis proofs that ext4 file system is better with a high storage and performance.
The second analysis contains the comparison of xfs and btrfs file systems against ext4. Both xfs and btrfs are extent-based systems while ext4 is also contains extends which replace traditional block-mapping mechanism. The ext4 file system supports persistent pre-allocation. All the files systems extended attributes which allows the system to assign several additional value repairs per file. The xfs file system uses the delayed, extent-based allocation while the ext4 uses multi-data allocation. Compared to ext4, exfs has a poor performance for meta-data intensive workloads. Ext4 is a better choice than btrfs on desktop because of it is already a default file system and is faster when transferring files. Generally, the comparison between various file systems shows that ext4 is the most suitable for Linux.
The digital network warfare commonly known is the most common type of warfare apart from even the battlefield warfare. Nations through the governmental organizations and industries are under high risk from this unpredictable and uncontrollable type of warfare. The cyberspace, which normally acts as the cyber battleground consists of major and minor players and bound by a law and specific causes of war (Pandya, 2019). Therefore, the cyberspace is growing blur and you could easily get attacked without knowing since the presence and activities in it are hidden from the public eyes. Humans are entirely dependable on artificial intelligence to combat the threats caused by the cyber warfare but risk the possibility of the AI using the cyberspace as a weapon. This essay will discuss the identification of survival and security threats.
The first way to identify a security threat is to assess the risks in our systems. This is made possible by assessing our systems and finding what makes the system so attractive to cyber felons. Customer information and private files are potential vulnerabilities. The type of information collected, storage and access information are the most basic factors to consider. Investigation on how to protect this data and the system as a whole is very essential.
The second way to identify this survival and security threats is to do research and understand the different external and internal threats. This step will assist in familiarizing oneself with these threats, the cybercrime and how they are committed. The strategies, methods and formula used by these threats to target systems should also be highly considered (Pandya, 2019). The different types of threats could be fashioned by persons of different calibers, from adolescents in bedrooms to displeased and bankrupt employees.
Another way of identifying security threats is through the assessment of the susceptibility of our cyber systems. Thanks to the growing development of the various instruments used to scrutinize our networks, scan the programs run by the system and check for software updates, vulnerability assessment has been taken care of. The tools will prompt the system administrator to scan the systems and perform massive attacks on such threats if present in the system.
A popular method to identify the security threats is through the identification of the impact of the particular threats to the system. Normal operations of the system would be interrupted if the system is attacked by a cyber threat. If a system is well structured, a clear assessment picture of the degree of the impacts of a threat on a system can be clearly seen. Collection of information about the system is also necessary
Once the impacts of threat are correctly assessed, different priorities are set on the various ways to strengthen the security of the system. Changes to the system’s security should be tested for any loopholes and liabilities in other sections of the system. People being the greatest millstones, policies on system usage and practices are formulated.
In conclusion, systems cannot be fully protected from cyber threats. Therefore, it is also important to be prepared in case of any attack.
Pandya, J. (2019, August 15). Tracking cyber warfare patterns. Forbes. https://www.forbes.com/sites/cognitiveworld/2019/08/15/tracking-cyber-warfare-patterns/#31ee44dc4093
Salter, J. (2018). Understanding Linux filesystems: Ext4 and beyond. Opensource.com. https://opensource.com/article/18/4/ext4-filesystem