Friday, May 22, 2020

A Computational Asset Vulnerability Model For The...

A Critical Review of â€Å"A Computational Asset Vulnerability Model for the Strategic Protection of the Critical Infrastructure† Article Summary of the Article A brief background of this article shows that it presents the doctoral works of Richard White on security under the supervision of Terrance Boult and Edward Chow. The article was published online by the â€Å"International Journal of Critical Infrastructure Protection.† In this paper, Richard White present a new computational model that can be of help in organizing for strategic protection of the key infrastructure in the US and elsewhere. Under the supervision of Terrance Boult and Edward Chow, R. White presents the Asset Vulnerability Model as a guide to be used in strategizing protection measures of the key infrastructures. The article begins by giving a brief introduction of the genesis of the problem whereby R. White, T. Boult and E. Chow identifies the September 11 attack as the genesis for a need to mitigate the vulnerability of the key infrastructures in the US. They build up a history of the progress that has been taking place since 2001 whereby in 2002, Homeland Security Act was enacted and mandated the Department of Homeland Security (DHS), with a prime obligation of protecting the Critical infrastructure in the US. The department developed a protection plan which is in use up to date. However, these authors point out that the plan was full of flaws according to a research conducted by National Research council ofShow MoreRelatedCloud Computing: Fact vs Fog9053 Words   |  37 Pagesthis model have largely been ignored The recent economic turmoil and the promise of Cloud leading a renaissance of the tech sector are shaping the perspective and appetite for Cloud rather than the readiness of the technology itself. Cloud is a powerful tool for mobilizing data; however, there are no regulations, standards, or assurances of data protection from a technical perspective Major breaches at Google, Salesforce.com, and Amazon, have exposed the fragility of the Cloud delivery model, andRead MoreInformation Technology Management8338 Words   |  34 Pagestoday? Information systems are a foundation for conducting business today. In many industries, survival and the ability to achieve strategic business goals are difficult without extensive use of information technology. Businesses today use information systems to achieve six major objectives: operational excellence; new products, services, and business models; customer/ supplier intimacy; improved decision making; competitive advantage; and day-to-day survival. 3. What exactly is an informationRead MoreBig Dat A New Buzzword3725 Words   |  15 Pagesscalable to large and complex data volumes† (Davenport, and Dyche, â€Å"Big Data in Big Companies†). Typically, Hadoop uses an engine for processing called MapReduce which helps take the data and spread it out to different disks and to apply complex computational instructions. These are processed in parallel across various nodes. (Davenport, and Dyche, â€Å"Big Data in Big Companies†). So what are the real tangible benefits to big data? There are quite a few according to Nucleus Research. This firm catersRead MoreProject on Risk Management46558 Words   |  187 Pagesrisks, there is no reason for the bank to absorb these. Market or systematic risk is the risk caused due to adverse changes in market variables such as Interest Rate, Foreign Exchange Rate, Equity Price, and the Liquidity risk as banks fund long term assets (loans) with short term liabilities (deposits) thereby exposing themselves to the funding, time and call risks. Market risk can be hedged but cannot be diversified completely. Management of Market Risk is a major concern for every bank. The boardRead MoreCissp Study Guide67657 Words   |  271 Pagesprocedures, and guidelines flow. This order , however, does not mean that policies are more important than the lower elements. These higher-level policies, which are the more general policies and statements, should be created first in the process for strategic reasons, and then the more tactical elements can follow . -Ronald Krutz The CISSP PREP Guide (gold edition) pg 13 A security policy would include all of the following EXCEPT A. Background B. Scope statement C. Audit requirements D. EnforcementRead MoreManagement Information Systems22991 Words   |  92 Pagesinstantaneous communication. C) the reduction in travel times and the ubiquity of global exchange and travel. D) the growth of globalization. 3) The six important business objectives of information technology are: new products, services, and business models; customer and supplier intimacy; improved decision-making; competitive advantage; operational excellence, and: A) flexibility. B) survival. C) improved business practices. D) improved efficiency. 4) The use of information systems because ofRead MoreImpact of Foreign Aid on Poverty and Economic Development in Nigeria16050 Words   |  65 Pagesproduction capacity in the agricultural sector severely affected urban dwellers. Economic reforms were introduced by the government in 1986; Structural Adjustment Programme (SAP), which led to the removal of reduction of subsidies that were incidentally strategic to improving human welfare. Government spending on social services became dismal while the quality and quantity of public social services declined, especially in poor communities. Its social costs are reflected in increasing unemployment, cuts inRead MoreAppraisal Techniques of Public Investments and Projects62994 Words   |  252 Pagesanalysis ........................................................................ 111 4.6 Cost benefit analysis ............................................................................................................. 113 4.6.1 Input-output model framework......................................................................................... 114 4.6.2 Measuring and valuing benefits and costs ...................................................................... 114 4.6.3 Some importantRead MoreBusiness Information Systems31162 Words   |  125 PagesYour Career Multiple Choice Questions 1. One of the recent critical challenges facing Major League Baseball was: a. poor coordination between local and national sales channels. b. poorly managed sales channels. c. outdated information systems. d. decreasing ticket sales. Answer: d Difficulty: Medium Reference: p. 3 2. The six important business objectives of information technology are new products, services, and business models; customer and supplier intimacy; survival; competitive advantageRead MoreContemporary Issues in Management Accounting211377 Words   |  846 Pagesscholars in the Weld. The topic areas covered in some chapters reXect established management accounting topics such as budgeting and responsibility accounting, contract theory analysis, contingency frameworks, performance measurement systems, and strategic cost management, which are considered from the perspective of changing concerns facing modern organizations and present-day management thought as well as in the light of some of their historical dimensions. Other chapters deal with newly emerging

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.